Academia.eduAcademia.edu

Outline

Ebola: A Big Data Disaster

Abstract

Digitizing disaster response invites the problems of digital systems into the most fragile and vulnerable environments in the world. It is often humanitarian organizations that lead the charge, underestimating the practical and legal implications of digitizing these systems, from data security to operational coordination to the fairness of algorithms. In addition to their own digital transformations, many humanitarian organizations actively encourage governments, charitable foundations, technology companies, and mobile networks to share data in ways that are illegal without user consent or the invocation of governmental emergency powers. There is no more visible or apt example of this than the West African Ebola outbreak, which became a global health scare in 2014. This case study focuses on Liberia to illustrate (1) the challenges of digital humanitarian coordination during the Ebola outbreak; (2) the nascent state of mobile data modeling’s utility during complex emergencies; (3) the marked tension in the debate around experimentation with humanitarian technologies; (4) the laws that govern mobile network data and individual privacy; and (5) the institutions where victims of these data breaches could bring legal action.

Ebola: A Big Data Disaster Privacy, Property, and the Law of Disaster Experimentation By Sean Martin McDonald Executive Summary Digitizing disaster response invites the problems of digital systems into the most fragile and vulnerable environments in the world. Troublingly, it is often humanitarian organizations that lead the charge, underestimating the practical and legal implications of digitizing these systems, from data security to operational coordination to the fairness of algorithms. In addition to their own digital transformations, many humanitarian organizations actively encourage governments, charitable foundations, technology companies, and mobile networks to share data in ways that are illegal without user consent or the invocation of governmental emergency powers. The governance of emergency powers over digital systems remain poorly defined and badly regulated, and lack the basic due process checks and balances that exist for nearly every other kind of government emergency authority. The humanitarian community knows that it does not have the technological, legal, or institutional checks necessary to fairly or fully realize the promise of digital systems. That knowledge, however, hasn’t prevented many of the world’s most important and trusted institutions from taking irresponsible, at best, and illegal, at worst, risks with some of the world’s most sensitive data. The most prominent of these risks is the growing call for mobile network operators – the companies that provide mobile phone and data services – databases, which usually contain a significant amount of personal information. According to the most frequently cited expert for justifying the release of mobile phone records, we simply don’t have a sufficient understanding of how to apply these records to social services systems—even less so in fragile contexts. The humanitarian community lacks the data modeling, professional technology implementation standards, and the enforcement capacity to protect, or even define, the public’s interest. Even in places where there are regulatory institutions to fill the gap, emergency contexts often cause disruption or suspension of the safeguarding processes required to protect human rights. Without these processes – or any other form of public oversight – digitizing humanitarian systems can add layers of opacity to the already complex data models, implementation approaches, or intended outcomes of the response, further crippling tenuous public trust and good governance. Where this leaves us is a world where the stretching and violation of national, regional, and international human rights and data protection laws has become the norm, for a benefit that practically eludes definition, if it even exists. Despite that, many governments, businesses, and international organizations are routinely given access to mobile network operator data – Call Detail Records (CDRs), containing some of the most personal, re-identifiable data that people produce today. Humanitarian, academic, and journalistic calls for the release of CDRs gain the most traction in emergencies, contributing to a norm that actively disregards individual rights and consent. These practices not only put individuals at risk of harm, but as digital jurisprudence continues to come into its own, they will put many of the world’s best—and best-intentioned—international organizations at risk of onerous lawsuits. There is no more visible or apt example of this than the West African Ebola outbreak, which became a global health scare in 2014. This case study focuses on Liberia to illustrate (1) the challenges of digital humanitarian coordination during the Ebola outbreak; (2) the nascent state of mobile data modeling’s utility during complex emergencies; (3) the marked tension in the debate around experimentation with humanitarian technologies; (4) the laws that govern mobile network data and individual privacy; and (5) the institutions where victims of these data breaches could bring legal action. In 2014, a small outbreak of Ebola in West Africa grew into a global health crisis. Over the ensuing 18 months, Ebola infected almost 30,000 people and killed over 11,000. Although a large number of factors led to the spread of the disease, the early stages were characterized by rumor, misinformation, and a deep distrust of the institutions responding to the disaster. By the time the international community mobilized, the epidemic had been metastasizing for nine months, and required significantly more investment than initially anticipated. International health and humanitarian response agencies made apocalyptic predictions about the epidemic, sparking panic and uncertainty. A new wave of foundations, donors, and organizations took an interest in the response, leading to a surge in people, resources, and operational chaos. That chaos fed a growing narrative that the problem in the response effort was a lack of good information technology and, more specifically, data. The focus on technology catalyzed the introduction and adaptation of an enormous number of information systems, mostly through ad hoc imposition or adoption. Over the course of the epidemic, the operational infrastructure of the response involved more than 50 independent technology tools. One group catalogued more than 300 separate initiatives to engage the public, a small minority of which had any operational role or capacity. In addition to the usual challenges of coordinating a disaster response, the Ebola outbreak highlighted the difficulty of syncing information infrastructure with operations. As the epidemic began to peak, a group of academics and international development actors began to call for the use of aggregated location data from mobile phone networks in order to facilitate the response effort. These calls suggested that with real-time location data taken from mobile phone networks, responders could at least target response efforts and may be able to perform a process called contact tracing. Contact tracing historically refers to manual efforts to track the spread of contact-based diseases, like Ebola. The Ebola response included hundreds of contact tracers, who personally interviewed everyone infected and everyone they were exposed to. The theory was that with the ability to track aggregate movement patterns, the response movement could create a predictive model for the spread of the disease. A significant number of professional, donor and think tank organizations invested in various aspects of supporting the release of call detail records (CDRs), and nearly every affected country did – except for Liberia. Despite having the highest death toll of any country that experienced the Ebola epidemic, Liberia never compelled the release of CDRs, in part, due to concern about their ability to manage and enforce the necessary limitations. Mobile phone records, however, are one of the most personally identifying and regulated data sources in the world, raising significant privacy and property law questions. Nearly all of the discussion of the use of CDRs in the Ebola response referenced privacy as a concern, but didn’t interrogate the value of real-time data or the applicable legal frameworks. The vast majority of the examples given to justify the use of CDRs were vector-borne disease, meaning that probabilistic models bear out. However, Ebola is not a vector-borne disease, meaning that the same probabilities aren’t a useful indicator of transmission. At present, even the organizations designing and building the data models aimed at contact tracing urge more experimentation and nuance in the application of big data to disease surveillance. The privacy of people’s data within CDRs, let alone CDRs themselves, is nearly impossible to guarantee, even when anonymized – individuals can often be re-identified and records require correlation with personally identifying information in order to be a useful predictor of a contact-based disease. In this way, using CDRs to contact trace Ebola provides a stark trade-off between the potential of an experimental process and the very tangible threat to user rights. This analysis focuses on the two primary legal and human rights frameworks triggered by the release of CDRs: privacy and property rights. The right to privacy in Liberia emanates from the Constitution, and is subsequently defined in the Economic Community of West African States (ECOWAS) Supplementary Act and the Liberian Telecommunications Act of 2007. These laws, taken together, form a broad protection for the privacy of mobile data – requiring user consent or a governmental invocation of emergency powers in order to compel their release. Even in an emergency, the available law does not protect mobile network operators or the Government of Liberia, let alone third party organizations, from a civil or human rights lawsuit. The Constitution of Liberia grants similarly broad protections for private property, though it also contains provisions for expropriation. Although there are additional emergency powers granted to the President through the Public Health Law, all property seizure requires elements of due process and fair compensation. The presence of these laws takes the legal risk of using CDRs without user consent out of the hypothetical, and offers significant causes of action against a wide range of parties. Despite the available causes of legal action, constructing a useful case and selecting an appropriate venue for each component claim is extremely complex – and likely to be very expensive. Private commercial dispute resolution and industry regulation offer the best likelihood of reforming practice, though international human rights courts have the most aligned incentives, capacity, and mandate to provide legally binding remedies. Even with these mechanisms, many of the core concepts – such as the legal liability and limitation of data sharing, the concept of proportionality in privacy invasion in the public good, and an evaluative framework for disaster data models – will take years to evolve into legal significance. These practices, though, already have significance, and deserve legal attention and definition to protect basic human rights. No matter whether such efforts are successful, there is no question that Ebola will not be big data’s last disaster. Disclaimer + Copyright Ebola: A Big Data Disaster Privacy, Property, and the Law of Disaster Experimentation by Sean Martin McDonald Is licensed under a Creative Commons Attribution 4.0 International Public License. Manufactured in the United States of America by Occam Technologies, Inc. 1110 Vermont Ave, Suite 500 Washington, DC 20005 This paper was made possible by a grant from the Media Democracy Fund. All activities by Occam Technologies, Inc. were and are consistent under the Internal Revenue Code Sections 501(c)(3) and 509(a)(1), (2), or (3). If any lobbying was conducted by Occam Technologies, Inc. (whether or not discussed in the report), Occam Technologies, Inc. complied with the applicable limits of Internal Revenue Code Sections 501(c)(3) and/or 501(h) and 4911. Occam Technologies warrants that it is in full compliance with its Grant Agreement with the New Venture Fund, dated June 29, 2015, and, that, if the grant was subject to any restrictions, all such restrictions were observed. Table of Contents EXECUTIVE SUMMARY  3  FOREWORD  8  CHAPTER 1: THE EPIDEMIOLOGY OF UNCERTAINTY  12  CHAPTER 2: A DIGITIZING DISASTER  16  AD HOC HIERARCHY  17  ORGANIZATIONAL DIGITIZATION, INTER-ORGANIZATIONAL DISCONNECTION  17  OPERATIONAL CONTEXT AND COMPLEXITY  18  DATA, SOVEREIGNTY, AND THE POLITICS OF CONTROL  19  HUMANITARIAN TECHNOLOGY AND THE DISASTER MARKET  21  CHAPTER 3: CDRS AND CONTACT TRACING EBOLA  23  CONTACT TRACING EBOLA  25  CDRS  27  TRACING EBOLA WITH CDRS  29  CHAPTER 4: DEBATABLE EXPERIMENTATION  31  THE ENDLESSLY ONE-SIDED DEBATE  31  VARIABLE PUBLIC GOOD  33  DIGITAL EMERGENCY POWER  35  CHAPTER 5: THE LAW  35  INTERNATIONAL PRIVACY LAW  37  ECOWAS’ SUPPLEMENTARY ACT  37  LIBERIAN PRIVACY LAW  41  LIBERIAN TELECOMMUNICATIONS ACT OF 2007  41  THE DATA PROTECTION AUTHORITY THAT WASN’T  44  LIBERIAN PROPERTY RIGHTS  45  CHAPTER 6: THE LAW INACTION  46  PRACTICAL ISSUES  47  LEGAL MECHANISMS  49  CONCLUSION  52  RECOMMENDATIONS  56      Foreword In June of 2015, South Korea was struck by an outbreak of Middle East Respiratory Syndrome (MERS), killing 36 people (out of 186 infected). During their response, the Government of South Korea did something truly unprecedented – it used citizens’ personal information, taken from mobile phone company databases, to impose quarantine on more than 17,000 people. These quarantines were not always based on direct evidence of contact or infection - they were imposed based on probabilities of infection. The Government of South Korea used algorithms to pre-emptively restrict the movement of thousands of people without any direct evidence of infection, for a disease that is relatively difficult to transmit. The outbreak and the quarantines were devastating to the economy, reducing tourism by 40 percent and causing the Government to deploy $9 billion in relief. Although most citizens in South Korea are reportedly willing to consent to this use of their data, many suggest that public consent is uninformed and stoked by anxiety – largely due to the opacity of the Government’s response effort. More concerning, the Ministry of Health has made it clear that they don’t need public consent to obtain personal information or to impose quarantine for “the public good.” What we don’t know is whether that seizure of information resulted in a public good. Quite the opposite, there is limited evidence to suggest that migration or location information is a useful predictor of the spread of MERS at all. There is even less evidence to prove that the seizure of data was necessary to gather location information or that the imposition of quarantine helped contain the virus. There has been no public presentation about whether or how mobile data information was actually used – or what the effect of that use was. There is ample evidence to show that it significantly damaged the economy of South Korea and the freedom of South Koreans. Without more transparency, it’s simply impossible to know whether Government of South Korea acted necessarily, effectively, or proportionally to contain the MERS outbreak. Fundamentally, this type of government action amounts to the exercise of a new type of emergency powers, built on an undisclosed algorithm. Large-scale quarantine is—other than civil war, martial law, and internment camps—the most severe restriction of freedom that a government makes against its own people with the implicit threat of force. And it is the only one that takes place without a violent, causal event. Collecting and seizing personal mobile phone records is the most egregious violation of individual’s digital human rights– let alone as a commercial or national security asset. In almost every democracy, the assertion of emergency powers are subject to due process analyses, at least by the legislature – if not the executive branch or security apparatus. There’s no question that emergency situations change the cost-benefit analysis, but they do not justify untested or inapplicable methods, nor the large-scale restriction of a people’s freedom in peacetime without just cause. The growing emergence of this new brand of emergency powers, unchecked due process, is why I decided to write this paper. That these powers are largely being outsourced to international organizations without the institutional capacity, processes, regulation, standards, infrastructure, or appropriate risk frameworks, is why we should all be concerned. The demands of the humanitarian community for increasingly large amounts of otherwise legally impossible to obtain data are growing with every disaster. These requests are not only increasingly audacious, they’re also increasingly vague – and, unlike the South Korean case, driven almost entirely by international donors and responders. Responsible actors acknowledge the need for policies and privacy frameworks, but they ignore the existing laws—international treaties, commercial regulation, and national data protection laws—that explicitly prohibit these requests. Worse, the organizations charged with building institutions and mitigating harm in the world’s most fragile environments are relying on the weakness of the same institutions to grant these requests. Just as there has been in nearly every other industry, the humanitarian industry is experiencing its digital gold rush – and a whole host of new and established agencies alike are using every tool at their disposal to gain an advantage. The best example of this dynamic is the recent Ebola epidemic in West Africa. This outbreak was called the “worst health crisis in many, many years,” by seasoned disaster responders – and catalyzed a large number of international attention in an effort to contain the virus. The epidemic response introduced an unprecedented amount of information technology – and a commensurate amount of complexity. Information technology and mobile data records became two of the highest-profile elements of the epidemic. In both Korea and West Africa, the focus on data collection, seizure, and sharing ignores the legal and practical implications involved. Within the Ebola outbreak, Liberia was the tipping point, where lack of faith in institutions transformed the outbreak from a containable health emergency to a global pandemic. Despite the enormous death toll and operational chaos, Liberia uniquely refused to share mobile network data with international organizations, despite repeated requests. Liberia is also a member of ECOWAS, which has some of the most sophisticated, if unimplemented, data protection law in the world. Liberia is an ideal case study to demonstrate the diversity and depth of potential international, regional, and local legal risks in the practices that growingly characterize digital humanitarian interventions. Case Study Methodology This case study is based on a combination of desk and in-country research. The desk research comprised an extensive literature review of news, operational reports from the Government of Liberia, international organizations, and media coverage. The researcher conducted in-person interviews with more than 20 key stakeholders that were directly involved in managing information systems in Liberia during the Ebola epidemic. The researcher has direct experience deploying technology in humanitarian disasters all over the world, including during the Ebola epidemic. Chapter 1: The Epidemiology of Uncertainty   The Ebola epidemic was the first pandemic of the Information Age and it publicly demonstrated the global interdependence of health systems. The West African outbreak was also one of the first global emergencies where humanitarian organizations blamed a lack of access to mobile network data as a primary driver of its death toll. For the first time, people all over the world watched as fragile West African health systems struggled, and ultimately failed, to control an outbreak. Ebola spread beyond West Africa, to the United States and Spain. Although those nations effectively contained the virus, the epidemic tangibly proved that every fragile healthcare system poses a threat to global health. The spread of the disease and its high regional death toll aren’t just an indictment of West African health systems, they are also a damning indicator of international community’s reaction. There are many political, economic, and logistically complex reasons for the delay in response – but by far the most publicly cited reason is information. Health and governmental institutions at every level failed to manage the information about the Ebola virus and its spread, causing massive delays, inefficiencies, and panic. In December of 2013, a single case of the Ebola virus killed a young girl in Guinea. Unlike the 24 previous incidents of Ebola in Sub-Saharan Africa, this outbreak spread to the urban centers of West Africa, growing through a combination of mismanagement and misinformation.1 The outbreak became epidemic that has killed more than 11,000 people in Liberia, Guinea, Fig ur e 1 Infog r aphic o ri ginall y ap pear ed i n the Ec ono mist and Sierra Leone - and A ugust 2 7 , 20 1 5 isn’t over. Within Guinea, Sierra Leone, and, particularly, Liberia, the spread of Ebola significantly damaged the already tenuous trust between the government, the media, and the public. Many governments released conflicting denials, reports, and                                                          1 Epstein, Helen “Ebola in Liberia: An Epidemic of Rumors.” The New York Review of Books (online) 18 December 2014: http://www.nybooks.com/articles/archives/2014/dec/18/ebola-liberia- warnings about the spread of Ebola, complicating what were already very weak relationships. Contradictory reports further damaged the public’s remaining faith in institutional narratives, enabling rumor to take the place of fact. In Liberia, journalists have a primarily antagonistic relationship with the government, meaning that they often amplified suspicion, by advancing their own accounts of events or Ebola itself. The absence of a legitimate, unified voice was felt throughout the social and political ranks. Some believed that Ebola wasn’t real at all. Others believed that Ebola was engineered by the Liberian Government to attract international funding. Almost two years into the epidemic, some still wonder aloud whether it was a plot by the American military to chase terrorist cells in the region. An International Alert study found that 81% of Liberians were angry with the Government of Liberia for their handling of the outbreak.2 Regardless of the specific rumor, chaos and anger were uniform. Even without confusion, the health systems in the affected countries didn’t have the facilities, capacity, or resources to contain a disease like Ebola. Ebola has a gestation period of 21 days, meaning an infected person can wait weeks before experiencing a symptom. The unique characteristics of the virus required affected health systems to build parallel infrastructure to track, treat, and bury patients. Each unit had to be capable of identifying, holding, testing, and treating patients – and everyone they’d come into contact with after exhibiting symptoms – for weeks to be sure they weren’t infected. Even committing every major healthcare facility and ambulance to the response, Liberia did not have the dispatch or response resources to manage reports of Ebola, let alone the usual health needs of the country. At the peak of the epidemic, the estimated cost of building and maintaining an Ebola Treatment Unit were $170,000 and $1m per month per facility, respectively.3 By July of 2014, before the international community deployed and the peak of the epidemic, the Liberian response already had a $15m dollar shortfall.4 The affected countries simply did not have the means to independently isolate and contain the Ebola epidemic. The financial and practical costs of building a parallel health system meant that the government was forced to turn to international organizations for assistance.                                                          2 Mukpo, Ashoka “Surviving Ebola: Public perceptions of Governance and the outbreak response in Liberia.” International Alert 30 June 2015: http://reliefweb.int/report/liberia/surviving-ebola-public- perceptions-governance-and-outbreak-response-liberia 3 “Much worse to come.” The Economist (online) 18 October 2014: http://www.economist.com/news/international/21625813-ebola-epidemic-west-africa-poses- catastrophic-threat-region-and-could-yet 4 “Liberia Operational Plan for Accelerated Response to the Re-Occurrence of the Ebola Epidemic.” Government of Liberia, Ministry of Health and Social Welfare. July- December 2014: http://www.who.int/csr/disease/ebola/evd-outbreak-response-plan-west-africa-2014-annex3.pdf The international humanitarian and health systems, however, responses faced a different set of challenges, leading to significant tension with the national governments of affected countries. The national governments were afraid of capital flight if the international business community learned about the epidemic, whereas international responders were dependent on public concern to motivate resource donations and political pressure. The World Health Organization, for example, is not equipped for emergency response – it’s wholly dependent on donations for core funding to respond to public health crises.5 As a result, the international health community was slow to mobilize. The WHO didn’t declare the Ebola epidemic a Public Health Emergency of International Concern (PHEIC) until August 8, 2014.6 That was 9 months after the outbreak began in Guinea, 6 months after receiving warnings from their internal regional teams, and 4 days before the death toll reached 1,000.7 More than a month later, the UN established the United Nations Mission for Emergency Ebola Response (UNMEER), an independent responder that acted independently of the humanitarian and health response communities.8 The delay in official response was more than a bureaucratic disaster - it allowed both the epidemic and rumors that surrounded it to grow. “They came in very late,” said Tolbert Nyenswah, Liberia’s Assistant Minister of Health, ”and because they came in very late, we are suffering this today.”9 When the international community did deploy, it got the world’s attention – but not in the way that it intended. Almost immediately after declaring an emergency, the WHO and the Centers for Disease Control and Prevention (CDC) made nearly apocalyptic projections about the scale and mortality of the epidemic – adding the telling caveat “without more intervention.” The WHO projected that Ebola’s mortality rate could reach 90 percent in August of 2014, when mortality rates ranged between 42 and 74 percent.10 In September of 2014, the CDC projected that the epidemic could hit between 550,000 and 1.4m cases by January of 2015.11 These projections were overstated - the total number of reported cases is under 30,000                                                          5 “Report of the Ebola Interim Assessment Panel” World Health Organization, pg. 12. 7 July 2015 http://www.who.int/csr/resources/publications/ebola/ebola-panel-report/en/  6 “Report of the Ebola Interim Assessment Panel” World Health Organization, pg. 12. 7 July 2015 http://www.who.int/csr/resources/publications/ebola/ebola-panel-report/en/ 7 Davis, Rebecca. “Ebola epidemic 2014: timeline.” The Guardian (online) 15 October 2014: http://www.theguardian.com/world/2014/oct/15/ebola-epidemic-2014-timeline 8 “Report of the Ebola Interim Assessment Panel” World Health Organization, pg. 24. 7 July 2015 http://www.who.int/csr/resources/publications/ebola/ebola-panel-report/en/  9 York, Geoffrey “Only a few aid agencies willing to help fight Ebola in Africa.” The Globe and Mail (online) 3 October 2014: http://www.theglobeandmail.com/news/world/aid-agencies-fail-to- mobilize-ebola-resources/article20930983/ 10 Kelland, Kate “Ebola mortality rate expected to rise as outbreak runs its deadly course.” Reuters (online) 5 August 2014: http://www.reuters.com/article/2014/08/05/us-health-ebola-mortality- idUSKBN0G526M20140805 11 Glennerster, Rachel; M’Cleod, Herbert, and Suri, Tavneet, “How Bad Data Fed the Ebola Epidemic.” The New York Times Op-Ed (online) 30 January 2015: http://www.nytimes.com/2015/01/31/opinion/how-bad-data-fed-the-ebola-epidemic.html?_r=2 and the mortality rate was closer to 70 percent.12 The motivation for these projections is the subject of a lot of speculation, but their accuracy leave less to debate. The WHO and CDC’s statements came at a critical time during the response, and ultimately traded public faith for financial support. The international community’s messaging successfully motivated the commitment of billions of dollars in support – but it also incited panic in the public and responder communities. As in the affected countries, the lack of a credible voice led to the politicization of the response effort - causing travel restrictions, protectionism, and significant delays. The international donor community simultaneously committed hundreds of millions of dollars and refused to supply doctors.13 By September of 2014, the concerns about responder capacity became so severe that Médecins Sans Frontières (MSF) – a traditionally neutral humanitarian organization – called for military intervention.14 In October of 2014, 10 months into the epidemic, there were only two international non-profit organizations supporting treatment efforts – and they struggled to recruit qualified volunteers.15 The international community was successful in compelling public resources to combat Ebola, but in doing so, had to foster a narrative of chaos, fear, and uncertainty. The dependence of international health and humanitarian response on volunteer donations engenders fierce competition among responders, creating an ongoing incentive to sensationalize disasters (even the word ‘disaster’ is itself sensational). In an age where information and resources move globally, with little regard for borders, humanitarian organizations have been lax to apply their principles to the newly compounded effects of their communications and response efforts. The Ebola epidemic may have been one of the most successful mobilizations of international donations in history, but that success likely came at the expense of institutional trust, operational coordination, and the lives of victims.                                                          12 “Ebola: Mapping the Outbreak” BBC News Africa (online) 19 June 2015 http://www.bbc.co.uk/news/world-africa-28755033   13 “Much worse to come.” The Economist (online) 18 October 2014: http://www.economist.com/news/international/21625813-ebola-epidemic-west-africa-poses- catastrophic-threat-region-and-could-yet  14 MSF called for the United Nations members to deploy biohazard containment teams, which are typically military units trained to respond to biological and chemical weapons. Pérache,André Heller. “’To put out this fire, we must run into the burning building’: a review of MSF’s call for biological containment teams in West Africa.” Humanitarian Exchange Magazine, Issue 64 June 2015: http://www.odihpn.org/humanitarian-exchange-magazine/issue-64/to-put-out-this-fire-we-must- run-into-the-burning-building-a-review-of-msfs-call-for-biological-containment-teams-in-west-africa 15 York, Geoffrey “Only a few aid agencies willing to help fight Ebola in Africa.” The Globe and Mail (online) 3 October 2014: http://www.theglobeandmail.com/news/world/aid-agencies-fail-to- mobilize-ebola-resources/article20930983/   Chapter 2: A Digitizing Disaster Operational chaos is par for the course in disaster – and the Ebola epidemic is no exception, but it is among the first to so visibly struggle with digitization. Nearly every after-action review of the response points to the lack of structure or foundation to coordinate response during a global pandemic. What was unique to the emerging narrative of the Ebola epidemic, both during and after the height of the crisis, was the degree to which it focuses on health information systems and data.16 Media coverage and international organizations spent significant resources creating a market for interoperability in health information technologies and advocating for the public and humanitarian use of mobile network data. The funding, coverage, and growingly digital practices of humanitarian agencies catalyzed a rapid proliferation of digital interventions in Liberia. These interventions were rarely coordinated, often unrelated to the response effort, and caused more confusion than benefit. The digitization of the Ebola response compounded the challenges of humanitarian response with the challenges of information system harmonization, without solving the significant legal, financial, and practical risks involved. Altering control of and access to information fundamentally alters the underlying power relationships around them. Publicly releasing operational health system information may undermine the ability of national governments or international coordination bodies to compel and coordinate response efforts. Similarly, compelling mobile network operators to provide real-time access to their data infrastructure, even with privacy protections in place, without user consent extra- legally surrenders some of the most personal data individuals generate. The assumption that open and interoperable data will lead to better health response is untested, as is the assumption that mobile network data records measurably improve health system response efforts. There are fewer questions about whether access to large datasets that are typically subject to commercial, privacy, and governmental restriction, is valuable. Opening health information systems and mobile network data implicitly reduces dependence and decentralizes response capacity – which may improve outcomes, but it may also substantially complicate the already significant challenges involved in creating a coordinated, cohesive response.                                                          16 Although coverage varied, technology played prominently as a theme in Ebola coverage – ranging from big data analysis platforms to mobile phones. Coverage came from nearly every globally influential publication, including the Guardian, New York Times, the Economist, Der Spiegel, Al Jazeera, and many others. Coverage also extended to academic and industry publications. This research was not able to provide a comprehensive coverage assessment, but Google returns 25,200,000 results for “Ebola and Technology,” – whereas “Ebola and ‘West Africa,’” returns 12,500,00 results. Within that, Google returns 485,000 results for “Ebola and ‘mobile phone,’” and 437,000 results for “Ebola and “big data.”” This is far from scientific, but lends to the assertion that there was a significant amount of globally influential coverage. Ad Hoc Hierarchy Health systems, even in emergency, are hierarchically organized – as a matter of sovereignty and, ideally, practicality. The structure of health information systems typically map to those hierarchies with varying indicator definition, data format, and reporting structure standards. The health system in Liberia was no exception, though it primarily used paper records – transported at regular intervals to the Ministry of Health (MoH) for aggregation, digitization, and analysis. In some cases, paper records were digitized for aggregated reporting to the MoH – but rarely in real-time and never toward the level of awareness required during an active epidemic. When the international community came in, it made digitizing health information a priority – sometimes consciously, sometimes as a logistical afterthought. Regardless of intent, digitization was initially piecemeal, which added another logistical challenge between the people and systems trying to build a systemic response. Although there were significant problems in building a functional information reporting and response system, the vast majority of the challenges faced by responders were organizational, operational, and political. Organizational Digitization, Inter-Organizational Disconnection Each organization within the response effort had their own digital infrastructure, almost all of which were proprietary and tailored to their own use case. It’s important to note the distinction between individual habit and technological interoperability – many of the systems used to respond to the Ebola epidemic were technologically capable of being integrated with other systems. However, the disaster response organizations very rarely took the time to synchronize the definitions and formats of information collected, create or enforce data licensing relationships, or even understand partner systems. Even the ad hoc responder coalitions that initially shared data and technology systems, shrunk and came apart during the disaster.17 “People just wanted to contribute in a way that could make impact and learning new tools would delay that. Collaboration is time consuming… they didn’t want to express any kind of hindrance on what could be implemented in a short time period. Overall, I just sensed that a lot of these                                                          17 There were a significant number of alternative health information systems created for small coalitions of responders. The International Rescue Committee formed one such coalition – and database system, for its own use, in collaboration with Global Communities, the iLab, Medical Team International, and Action Against Hunger. According to one of their leads, they began by using the MoH’s system – DHIS 2 – but felt as though the interface and platform didn’t meet their needs, nor did having to interface with the Government as intermediaries. Interview. Augustine Kornyon, Data Coordinator for the International Rescue Committee. 24 September 2015. people wanted to own their data, they wanted to have some kind of information power.” 18 One of the emergent problems of modern disaster response is that humanitarian responders focus on direct impact – meaning that they discount the value and importance of building functional communication standards and coordination frameworks. The result is that responders neither have the time, nor the inclination, to learn new technological systems once they’re deployed. The natural resistance to learning new systems coupled with the exigency of the epidemic adds informational disconnect to the typical coordination challenges during disaster. The financial (and personal) incentives for disaster response organizations favor those that are able to prove unique impact in a short period of time, which is rarely measured through collaboration or collective impact. As Carter Draper, who helped coordinate several information systems for response organizations through the iLab in Liberia, said; “[i]f it wasn’t part of their mandate, they weren’t going to do it – they could barely do what their mandate was.”19 Inter-organizational data sharing is rarely a contractual requirement for response organizations, and therefore not measured – meaning that it not only causes operational drag, it actively erodes competitive advantage. It is practically easier and financially beneficial for humanitarian organizations to develop their own information systems, instead of focusing on building functional communication sharing. Operational Context and Complexity The information chaos, like the operational chaos, was pronounced and became a defining characteristic of the response effort. Prior to the epidemic, the MoH managed data through three independent units: (1) the Health Management Information System, which generated data through the healthcare system; (2) the Research Unit, which provided analysis, evidence, and structure; and (3) the Monitoring and Evaluation Department, which tracked trends and the overall effectiveness of the healthcare system.20 Below the level of the MoH, there are subsystems that vary by geography (counties and districts), facility (emergency dispatch, triage unit, lab, treatment center, hospital), and health system function (investigation, holding, testing, treatment). Each component system functioned independently, producing its own records and periodically reporting to the MoH. Ultimately, these systems produce an enormous amount of information – they record every point of patient contact – they just do it in paper forms, limiting its utility and usability. When Ebola struck, the MoH and, eventually, international organizations built an almost entirely parallel ad hoc health system designed to identify, separate, and                                                          18 Interview. Carter Draper, Information Coordinator with iLab Liberia. 21 September 2015.  19 Interview. Carter Draper, Information Coordinator with iLab Liberia. 21 September 2015  20 Interview, Luke Bawo, Head of the Information Management System, Ministry of Health. 26 September 2015 treat the virus. Each ad hoc component brought its own ad hoc information system. “Everything around Ebola – the reporting, data collection, and information sharing mechanisms were all ad hoc structures that we manage,” said Luke Bawo, the Head of the Information Management Systems.21 Even his position, as central coordinator of information systems, was created during the Ebola outbreak, based on the need to integrate existing information management infrastructure and those of international actors into a single operational framework. That job is no small feat - there were more than 50 separate technology systems introduced during the response effort alone.22 Bawo is responsible for synchronizing data consumers and producers of data, operating from different baselines and largely relying on Liberian agencies to ensure data quality, availability, and coordination.23 Data, Sovereignty, and the Politics of Control Every new health information system created or introduced during the response also has a de facto responsibility to integrate with the MoH’s reporting requirements, data definitions, and, most importantly, operational infrastructure. That responsibility emanates from the Government’s sovereign responsibility for the health of its people. Though that concept is broadly acknowledged, it doesn’t have a clear operational or implementation framework. That ambiguity means that the authority to compel reporting inputs and approve requests for information is almost as ad hoc as the rest of the operational response infrastructure. That creates the space for international organizations to push back against reporting requirements to the Government of Liberia, which they did.24 Nearly everyone interviewed suggested that international organizations were more focused on consuming information than creating a two-way reporting relationship with the MoH. This became a significant source of tension – some responders shared information within their own organizational hierarchies more quickly and regularly than they did with the MoH. In at least one instance, this resulted in new Ebola deaths being reported by a responder’s headquarters before the MoH knew about it – causing a political backlash. On the other side, the Government was under-resourced to manage its own response efforts, which also manifested in information management processes. Many of the private and international organizations describe functional difficulties using the MoH’s system, and procedural challenges in coordinating with the Government.25 The sheer magnitude of the response, exigency of the epidemic,                                                          21 Interview, Luke Bawo, Head of Information Management Systems, Ministry of Health. 26 September 2015. 22 FORTHCOMING. “Regional, Real-Time Data Infrastructure for Ebola Response.” Gobee Group July 2015, pg 52  23 Interview. Thomas Davis, Director of Geographic Information Services, Liberian Information Service. 22 September 2015. 24 Interviews. Luke Bawo, Thomas Davis, Dr. Ling Kituyi, and Augustine Kornyon. September 2015.  25 Interview. Augustine Kornyon, Data Coordinator for the International Rescue Committee. 24 September 2015. and volume of chaos, made it nearly impossible to manage communication in real- time. The technological syncing of data reporting systems is a complicated and unfinished technical task in the best of circumstances – but the underlying information relationships during the Ebola response were a proxy for larger political negotiations about roles, authority, and resources. The Government of Liberia wanted to be the single authoritative source of information on the epidemic. Although there weren’t any publicly documented objections, the response effort wasn’t coordinated enough to make a command- and-control approach practical. The Government of Liberia uses a primarily form- based application process to manage information requests. The applications are fairly lightweight, requiring date, organization, and purpose – but not much else. There are variations based on type of information and logistics (including things like desired data format) for processed data. Even with established processes, many of the implementing offices were either under-resourced or outright shut down – leading some organizations to seek authority and guidance from international data ethics institutions.26 There are no published guidelines that explain how the Government assesses the validity of data requests – but most of the officials interviewed suggested that requests were granted based on the perception of the requester’s intention and affiliation.27 International responder organizations, such as UNICEF, USAID, and MSF, also made requests to more sensitive data sources.28 These requests were often for direct access to back-end databases, real-time information from mobile network operators, or personally identifiable health record information gathered from facilities. For more sensitive requests, the Government typically requires formal data sharing agreements. The data sharing agreement requirement has been controversial with responder organizations and politically complex to implement – meaning that very few have been operationalized: “If it’s with the WHO, it’s a given based on their technical assistance role – it was more or less a mandate that the information management system shared information with them… Outside of them, it gets foggy. Can you routinely share raw data with MSF or CDC? So we grappled with those. We got repeated requests, but we stood firm and required a data sharing                                                          26 During the epidemic, the Liberian MoH’s Internal Review Board (IRB), the body charged with reviewing the ethics of research methodologies and information use according to domestic standards, shut down. According to researchers at Johns Hopkins, affiliated with Health Communication Capacity Collaborative (HC3), academic researchers used their home institutions’ IRB. Interview. Anna Helland, Country Director, HC3 Project. 21 September 2015. 27 Interview. Joe Kerkula, Head of Social Mobilization for the Ministry of Health. 25 September 2015. 28 Interview. The Honorable Angelique Weeks, Chairwoman of the Liberian Telecommunications Authority. 24 September 2015.   agreement – the question was who should sign it and I was a bit reluctant. Let it be a political decision.” – Bawo 29 Political relationships are one of – if not the – most determinative factor in access to both information and funding support. One of the most illustrative, albeit anecdotal, examples of this dynamic comes from the recent USAID-sponsored conference on the interoperability of health information systems in Monrovia. The event was focused on building interoperable digital infrastructure for Liberia’s MoH during an open solicitation for proposals aimed at exactly that issue, and was only open by invitation. This example isn’t meant to criticize USAID’s approach, but rather to demonstrate the natural tension between open technology systems and locally relevant operational coordination. The point at which information decisions reflect or affect authority and operations is also the point at which they become political. The MoH is still building a structure to formalize and systematically share health information with third-party service providers. Humanitarian Technology and the Disaster Market During the peak of the epidemic, the volume of media coverage and its focus on the informational chaos attracted the attention and efforts of a wide range of conventional and unconventional groups. By the time the international community mobilized its resources – which happened after the peak of the outbreak – the active responders had already built a largely ad hoc information infrastructure. Those ad hoc systems served basic needs, but also created a significant amount of space for criticism - data commonly moved through advertising supported and unsecured platforms, like e-mail and Google Fusion tables. Those criticisms fueled a wave of technocentric approaches, all of which needed on-the-ground partners and access to data from already overwhelmed infrastructure. For all of the coordination flaws in the information systems implemented by the Government of Liberia and the international community, there was an even larger push from aspiring humanitarian technologists. A group of researchers found more than 300 separate initiatives to use messaging to engage communities in the affected countries – most of which were blasting messages out without even enabling two-way communication.30 Two-way communication is fundamental to building trust and local impact – without the capacity for response, messages exacerbate the strain placed on infrastructure, attention, and legitimate sources of information. Not only were these information systems unresponsive, they were disconnected from the responders, meaning they didn’t have any ability to answer questions, provide treatment, or even refer people to facilities that could provide                                                          29 Interview, Luke Bawo, Head of Information Management Systems, Ministry of Health. 26 September 2015  30 Desiderio, Brandon “Fighting Fear and Stigma with Accurate Ebola Information.” Ebola Communication Network (online) 19 August 2015: http://ebolacommunicationnetwork.org/fighting- fear-and-stigma-with-accurate-ebola-information/ treatment.31 The majority of the coverage of both the issues and initiatives, even in reputable outlets, was remarkably uncritical. Still, the coverage had the desired effect – it catalyzed an outpouring of funding from foundations, governments, militaries, scientific research organizations, and even mobile network operators.32 For charitable organizations, the combination of money and popular media attention creates peak market conditions, which has the potential to distort programmatic focus and priorities. Dr. Ling Kituyi, who was the Foreign Medical Team Coordinator for the WHO, said: “It was a whole cottage industry of people, even within WHO, who were trying to sell their apps. The most irritating part was one app that was designed to follow-up with people every day and get their data. Every day the person had to fill in their information… Why were we asking all these questions – it wasn’t because we needed it, it was because all these people wanted their data.”33 Luke Bawo was less diplomatic: “I refer to it as a shark smelling blood in the water – if someone’s wounded in the water, sharks smell it and start to circle… The international response to the emergency was to mobilize resources, so clearly it was a business opportunity for a lot of people.”34 The most finite commodity in a disaster is the time and attention of the organizations that have an operational role in the response, especially after they’ve implemented “good enough” solutions. Despite the funder interest, the influx of app developers and big data analysts struggled to get the traction necessary to build an integrated or longer-term initiative with operational organizations. Notably, there                                                          31 Although there were exceptions, even mobile projects that built partnerships in effected countries usually did so with content providers as opposed to healthcare providers. The differences were embedded enough that even GSM Association’s Blueprint for Mobile Response to Ebola provides a broadcast, as opposed to service delivery model. “Blueprint: Ebola Mobile Response” GSMA Mobile for Development mHealth and Disaster Response (online) October 2014 http://www.gsma.com/mobilefordevelopment/wp-content/uploads/2014/10/gsma-Ebola-Mobile- Response-Blueprint.pdf   32 Sometimes, even on the same project. There was an unprecedented amount of funding from varyingly involved organizations to prove a justification for applying emergency exemptions to the legal and privacy protections that typically prevent the release of call detail records. One example: Bengtssson, Linus; Buckee, Caroline O.; Lu, Xin; Tatem, Andrew J.; Wetter, Erik; and Wesolowski, Amy. “Commentary: Containing the Ebola Outbreak – the Potential and Challenge of Mobile Network Data.” PLOS (online) 29 September 2014: http://currents.plos.org/outbreaks/article/containing-the- ebola-outbreak-the-potential-and-challenge-of-mobile-network-data/ 33 Interview, Dr. Ling Kituyi, Foreign Medical Team Coordinator, World Health Organization. 18 September 2015. 34 Interview, Luke Bawo, Head of Information Management Systems, Ministry of Health. 26 September 2015  was a small group of international organizations with the independent funding and political capital that enabled them to build medium-term technological projects – several of which gained significant traction as standalone information systems.35 Outside of a few exceptions, however, technology-focused initiatives struggled to get legitimizing interest from operational organizations. The Ebola response was neither fully analogue, nor fully digital – nor is it complete. The prominence of information technologies as components of the operational response, however, raises a host of new and traditional humanitarian response problems. The standardization of indicators, coordination of operations, and regularization of reporting – between and within response organizations – were significant problems before digitization. Each of these challenges is amplified by the complexity of new technologies, as are the incentives that compel humanitarian organizations to build market advantages over would-be collaborators. One of the least-discussed elements of humanitarian information technology implementations is the significant legal risks posed by the collection, use, and international transfer of personally identifiable data. By virtue of their context, humanitarian interventions often occur in extra-legal gray areas, with varying degrees of propriety forgiven under the assumption of public benefit. These calculations often don’t consider the necessity, proportionality, and efficacy of the tradeoffs made during times of emergency – each of which could play a role in a legal challenge. Without any check on the tendency to make short-term concessions that have long-term effects, international health and humanitarian organizations can over-reach and subject themselves to legal challenges from the very people they intend to help. During the Ebola epidemic, the most prominent example of this kind of overreach was the call for mobile network operator records – usually called call detail records or call data records (CDRs) – in order to perform migration analysis and contact tracing.   Chapter 3: CDRs and Contact Tracing Ebola CDRs include some of the most sensitive data that people generate, including location history, substantive communication history, and personal billing data. Despite that, there is very little evidence to suggest that CDRs, especially those that                                                          35 One example is the “Dey Say” project implemented by UNICEF and Internews, in partnership with local media and the Liberian Red Cross Society to combat rumors. Although measuring impact is difficult with information systems, their engagement volume and process are being used to build disaster preparedness. Iacucci, Anahi Ayala “Combatting Rumors About Ebola: SMS Done Right.” Medium (online) 26 March 2015: https://medium.com/local-voices-global-change/combatting- rumors-about-ebola-sms-done-right-da1da1b222e8 have been anonymized, are useful to track the spread of the Ebola virus. Nevertheless, the farthest-reaching, most common, and least interrogated requests for data during the epidemic were the international community’s push for the release of CDRs to aid response efforts. This case study performs an in-depth investigation of the way that CDRs could be used to track Ebola, revealing that they’re only useful when re-identified, invalidating anonymization as a balancing approach to privacy, and thus legal, protection. Not only are CDRs an ineffective way to track the Ebola virus, sharing CDR data likely violates data protection law. In August of 2014, the MIT Technology Review published an article suggesting that mobile network data could be used to predict the spread of the Ebola virus.36 The article drew on the work of Flowminder, a Swedish data science non-profit, and Caroline Buckee, a Harvard epidemiologist.37 The idea and concept grew substantially from there – both in media coverage, complementary academic studies, and among development donors – leading to numerous requests for mobile networks and the Liberian Telecommunications Authority (LTA) to release CDRs. The most typical version of the request was that CDRs could be anonymized to reflect aggregated population movement, which could also be used to build predictive models about the spread of Ebola. More aggressive versions of those requests suggested that CDRs could be used to perform contact tracing to track the infected – and so mobile networks should open access to their core user databases to donor organizations. Over the course of September and October, coverage and pressure grew, and ultimately networks in Sierra Leone and Guinea did share CDRs. In Liberia, the Liberian Telecommunications Authority (LTA) did not grant any requests to share CDRs with international and responder organizations.38 According to the Honorable Angelique Weeks, Chairwoman of the LTA, concerns about the Ministry’s capacity to manage and enforce data licensing environment were cause for caution. Despite requests from actors like USAID, NetHope, and UNDP, the LTA were closest to reaching an agreement with UNICEF – where, in exchange for the necessary hardware and training, they would create a real-time pipeline into the mobile networks’ databases.39 The contract included non-disclosure terms, data                                                          36 Talbot, David “Cell-Phone Data Might Help Predict Ebola’s Spread.” MIT Technology Review (online) 22 August 2014: http://www.technologyreview.com/news/530296/cell-phone-data-might- help-predict-ebolas-spread/ 37Talbot, David “Cell-Phone Data Might Help Predict Ebola’s Spread.” MIT Technology Review (online) 22 August 2014: http://www.technologyreview.com/news/530296/cell-phone-data-might- help-predict-ebolas-spread/  38 Interview. Angelique Weeks, Chairwoman of the Liberian Telecommunications Authority. 25 September 2015.  39 Interestingly, UNICEF’s mission focuses on the rights and protection of children – a group that has special privacy protections in both international and Liberian law. Interview. Angelique Weeks, Chairwoman of the Liberian Telecommunications Authority. 25 September 2015.  use limitations, and oversight by the LTA – although it was apparently never executed.40 Unfortunately, very few of the articles or requests interrogated the need for migration data in depth – or whether any of the uses or justifying examples, bore comparison to the Ebola epidemic. Similarly, many of the calls for CDRs acknowledge that there are privacy implications – and policies that prevented their release – but largely presented them as afterthoughts, trivialities, or problems to be overcome in order to realize an obvious benefit. Understandably, in the face of an emergency, health and humanitarian responders will do nearly anything that seems as though it will help stem the growth of a disaster. That said, CDRs – especially when linked to health information – are some of the world’s most sensitive data sources. Without a deeper investigation, it’s extremely difficult to perform any kind of cost-benefit analysis – let alone evaluate the proportionality of the data release, explore what a data license to that information should look like, or consider the implications of international sharing and diffusion of provided CDRs. Even those analyses neglect the two, far more important considerations – namely, what are the laws that govern the sharing of CDRs, and is there any way to enforce them? This chapter broadly analyzes the value of CDRs to contact trace Ebola – to be followed by an in-depth analysis of the applicable international, domestic, regulatory, and contractual frameworks that apply in the Liberian context. Contact Tracing Ebola Contact tracing is one of the most aggressive and manual ways that health systems track a disease. In its most basic form, it identifies an infected person and interviews them to track every person that they’ve been in contact with during the period they were contagious. Historically, it’s an analogue process involving significant time from dedicated teams who interview the infected, visit the locations, interview and test others who have been exposed, and then repeat the process, to interview everyone the second person has been in touch with (provided they’re positive for the virus). Contact tracing is particularly effective for diseases that require direct contact with a contagious source in order to spread. Ebola is a hemorrhagic fever that’s manually transmitted through bodily fluids, meaning that it is not as contagious as many other diseases. However, the virus causes victims to expel a wide range of fluids, meaning that contact in later stages of infection is extremely contagious, even after death. Ebola requires direct contact with the fluids of an infected person after they’ve begun exhibiting symptoms. Despite having a high mortality rate, Ebola is relatively difficult to transmit. For context, the R0 scale – the definitive system used to rate how quickly a disease spreads – gave the Ebola epidemic in West Africa a                                                          40 Interview. Angelique Weeks, Chairwoman of the Liberian Telecommunications Authority. 25 September 2015.  1.51-2.53 rating, varying by country.41 That means that each person infected was likely to infect an average of 2 additional people. For comparison, Measles has a R0 score of 18.42 The rate at which Ebola spreads is important, but less important for this analysis than how it spreads. The way Ebola spreads determines what data points are useful predictors of additional infections. During the Ebola epidemic, the international response put a significant focus on contact tracing. Like nearly every other aspect of the epidemic, the teams initially used paper-based records, realized the challenges involved, and transitioned to digital processes. Centrally, the WHO and the MoH brought in Dr. Hans Rosling, an international expert on data science and processes. Dr. Rosling built a small team to manually digitize the paper records that were collected from the Ebola Treatment Units (ETU), catalogue and then held daily briefings on the state of the epidemic.43 Eventually, the county and district levels developed their own Data Officers, who ensured reporting and digitization into decentralized databases and then aggregated them into the national system.44 The digitization effort was not technologically sophisticated – it was manual data entry into a straightforward database system. The goal of the contact tracing effort was to build the database to the point where every newly identified case of infection came from someone whose name they had. Essentially, every victim that wasn’t connected to a known source of infection meant that they didn’t have a complete handle on sources of infection. Gradually, over the course of the response, the contact tracing database became more and more thorough – and it was only when all known cases came from known sources, all known cases were isolated and treated in ETUs, and there were no new cases for 21 days that the epidemic was called over. Even that process, though, is flawed, because it failed to account for factors for longer-term gestation. After Liberia was declared Ebola-free on May 9, 2015, 6 confirmed cases emerged after a man who had recovered from the virus                                                          41 Althaus, Christian L.; “Estimating the Reproduction Number of Ebola Virus (EBOV) During the 2014 Outbreak in West Africa,” PLOS (online) 2 September 2014: http://currents.plos.org/outbreaks/article/estimating-the-reproduction-number-of-zaire-ebolavirus- ebov-during-the-2014-outbreak-in-west-africa/   42 Britton, Tom; Diekmann, Odo; Heesterbeek, Hans; “Mathematical Tools for Understanding Infectious Disease Dynamics,” Princeton University Press, 2013 Chapter 7, pg. 161  43 Interview, Dr. Ling Kituyi, Foreign Medical Team Coordinator, World Health Organization. 18 September 2015.  44 Interview. Augustine Kornyon, Data Coordinator for the International Rescue Committee. 24 September 2015.  transmitted it through sexual intercourse after a 7 week lull in new cases.45 Liberia was declared Ebola free again on September 3, 2015.46 The other major digitization effort in the contact tracing practice focused on contact tracers – namely, giving contact tracers digital data entry tools so that the information collected was digital and portable from the outset. Given the large number of mobile and digital data collection tools, this particular opportunity was more sought-after and contested. According to Bawo, there were at least 9 separate contact tracing applications pitched to him – and he wasn’t primarily responsible for that vertical of work.47 The Liberian and international response community mostly responded to these pitches the same way they reacted to others – namely that they had “good enough” systems in place, and with few examples didn’t adopt new tools after the peak of the epidemic. In November of 2014, Paul Allen organized the donation of 10,000 mobile phones, which were distributed to contact tracing teams, and added value – though providing scratch cards (the vehicle for delivering air time and messaging credit) was an ongoing challenge throughout the response.48 That said, digitizing the existing work of the contact tracers, once implemented, made a sizable difference to the speed and efficiency of digitization. This was the context for the call for CDR data. CDRs CDRs are a blanket term that refers to the data that mobile network operators collect in the course of providing telecommunications services.49 Although practice varies between operators, in order to both provide services and present billing statements, network operators store a customer’s name, address, billing status,                                                          45 Farge, Emma; Toweh, Alphonso. “Liberia confirms new Ebola case as outbreak spreads” Reuters (online) 14 July 2015: http://www.reuters.com/article/2015/07/14/us-health-ebola- idUSKCN0PO1EN20150714 46 “Epidemiological situation,” European Center for Disease Prevention and Control (online) 13 September 2015: http://ecdc.europa.eu/en/healthtopics/ebola_marburg_fevers/Pages/epidemiological-situation.aspx 47 Interview, Luke Bawo, Head of Information Management Systems, Ministry of Health. 26 September 2015  48 “Paul G. Allen Commits to Enhancing Communication Capabilities in West Africa to Help Fight Ebola.” Paul G. Allen Foundation, News (online) 17 November 2014: http://www.pgafamilyfoundation.org/news/news-articles/press-releases/enhancing-communication- to-fight-ebola Even the Emergency Dispatch Unit (EDU), which manages the national emergency help line and routes ambulances and investigation teams, faces an ongoing shortage of scratch cards – they are temporarily provided by the International Committee of the Red Cross (ICRC), but that program is scheduled to stop operations in November of 2015. Interview, Dr. Ling Kituyi, Foreign Medical Team Coordinator, World Health Organization. 18 September 2015. Interview, Arthur Vaye, Head of the Emergency Dispatch Unit, 23 September 2015.  49 In some cases, the term CDR refers to the data set that is required to provide billing statements to customers. These definitions can vary between national jurisdictions, regulatory frameworks, and company standards. account identifiers, payment information, log of incoming and outgoing phone calls, phone numbers attached to each call, length of each call, number of text messages sent and received, log of data use (including web sites visited, information transferred, apps used), and, where applicable, mobile money transactions history. Many mobile network operators record and store more information, but the above is typical. One other piece of information that mobile network operators require is location data. Mobile network operators track location in two primary ways, depending on the type of phone and the user’s privacy settings. The most common way is through towers – essentially, whenever a person uses a phone to communicate, it sends a signal to the closest tower or towers. The mobile network operator then triangulates location based on the speed at which that signal hits each tower. The accuracy of this method of location data is tied very closely to the density of the carrier’s tower infrastructure – in places where there are lots of towers, there are lots of data points and location data is accordingly more reliable. In places where there aren’t very many towers, for example, in rural West Africa, location is harder to triangulate.   Figure 2 Diagram Credit Chris Silver Smith, originally appearing in Search Engine Land Sept. 2008 The second way that mobile operators track location data is through the Global Positioning System (GPS) which uses deviations from true time, measured through a series of satellites, to measure and track location. This method of tracking, while more accurate, depends on the user enabling location tracking through the phone or an application on the phone (common examples are Google Maps, Find My iPhone, and Uber). Each of these applications uses data signal to track user movement, sending data points to the infrastructure at rapid intervals and using the more continuous flow of data to refine location information. When it comes to real-time location tracking of a large population, CDRs are undeniably the most effective, practical data source in the world. They are the most accurate and the most identifying of any data set that humans generate with any regularity. That is also why they are the most sensitive and have such a high potential for abuse. While this risk is noted in nearly all of the articles calling for the use of CDRs to augment contact tracing, none review whether they constitute a necessary data source to track Ebola. Tracing Ebola with CDRs Every virus is a little bit different, so every data model that built for tracking or predicting the spread of a disease needs to tailor to its unique characteristics. Ebola is a contact-based hemorrhagic fever, meaning that a person needs to have direct physical contact with the fluids of an infected person after they’ve become contagious – including after death.50 Unlike many other diseases, particularly those that have airborne or non-human carriers (like Malaria, which travels largely through mosquitos), there are no ambient or environmental factors that predict the spread of Ebola. In addition, while the presence of people is a necessary precondition for the spread of the disease that concerns the epidemic response, the mobility and migration implications of the Ebola outbreak were largely overestimated.51 Flowminder’s migration analysis using CDRs is the most broadly referenced justification for releasing CDRs to trace and predict the spread of Ebola, though the organization’s primary assertion is that real-time mobility data would have been valuable as a means of building targeted and adaptable containment strategies.52 While it’s possible – and certainly applicable in emergencies with significant variations in movement patterns – there’s a significant risk of overestimating the potential benefits of dynamic migration analysis of the transmission of this virus, held against the very real privacy costs of compelled CDR release. Even Dr. Linus Bengtsson, the Executive Director of Flowminder, is careful to nuance the significant way that virus transmission affects the importance of migration data to the data model: “If you’re planning traffic, you need the whole picture to model the road. If you’re trying to catch an individual traffic offender, the model of traffic can                                                          50 “Implementation and management of contact tracing for Ebola virus,” World Health Organization (online) September 2015 http://apps.who.int/iris/bitstream/10665/185258/1/WHO_EVD_Guidance_Contact_15.1_eng.pdf   51 The early spread of Ebola from Guinea to Sierra Leone and Liberia is often cited as proof of the importance of “migration” patterns to the growth of the outbreak. Those examples, though, don’t refer to group movements – they refer to individual movements. One could argue that group movements are a probabilistic model for individual movements, but that doesn’t effect the need to use CDRs unless you also assume that the relevant authorities don’t have knowledge of their highest traffic routes. In addition, simply knowing routes doesn’t correlate to insight about specific epidemiological indicators without significant amounts of medically and personally identifiable information. Interview, Dr. Linus Bengtsson, Executive Director of Flowminder. 11 September 2015.  52 Bengtssson, Linus; Buckee, Caroline O.; Lu, Xin; Tatem, Andrew J.; Wetter, Erik; and Wesolowski, Amy. “Commentary: Containing the Ebola Outbreak – the Potential and Challenge of Mobile Network Data.” PLOS (online) 29 September 2014: http://currents.plos.org/outbreaks/article/containing-the- ebola-outbreak-the-potential-and-challenge-of-mobile-network-data/  help – but it’s really an entirely different ball game… With Ebola, you need to see the other person, which you don’t see in the mobile data, so it’s not as interesting [for Ebola] as for vector-born diseases… Just because you go to the same 100km/sq. area doesn’t mean you met someone.”53 There are personal identifiers and cultural behaviors that are more likely to correlate to the probability of the virus’s spread, such as burial practices, which have a measurable impact on post-mortem transmission. Those datasets are often unavailable or highly dependent on correlation to other datasets in order to provide relevant insight (for example, maps of prevalence of cultural behaviors exist, but not in ways that directly document burial practices and the degree of direct physical contact involved in each). That use of burial practice information, however, clearly falls within the definitions of personally identifiable information – undermining assertions of the independent value of anonymized data in predicting the spread of Ebola. In other words, CDRs are only useful to Ebola contact tracing when they’re re-identified or linked to personally identifiable information. As a question of data modeling, that increases the benefit of using a dataset like CDRs, as there aren’t many other data sources that contain real-time relevant information for predictive modeling. Ultimately, this simplifies the analysis of privacy, because it eliminates the presumption that anonymized data is useful to track or predict Ebola. There is no reason to believe that there are technological ways to ensure privacy in CDRs – both because of the necessary correlations and the significant risks of re- identification. As a Brookings Institution white paper on mobile data collection in disease tracking said, “Best practices should accept that there are no perfect ways to de-identify data and there probably never will be.”54 Recognizing that – whether by necessity or technological insecurity – CDRs are only useful to track Ebola as personally identifiable datasets. Dispensing with the fiction that anonymization is more than intermediary protection for data sharers, at least for the purpose of containing a contact-based virus, significantly simplifies the ethical and legal analysis. The value of CDRs comes from correlation to personally identifying information, meaning that mathematical approaches to privacy risk mitigation that subsequently require re-identification are vehicles for managing liability. While that may be valuable for intermediaries as plausible deniability, it is, at best, a misleading statement about the intention and practice of digitally facilitated contact tracing and points to organizational and legal structures as the most realistic methods of managing data use, processing, and risks.                                                          53 Interview, Dr. Linus Bengtsson, Executive Director of Flowminder. 11 September 2015.  54 Kendall, Jake; Kerry, Cameron F.; and Montjoye, Alexandre de. “Enabling Humanitarian use of Mobile Phone Data,” Issues in Technology Innovation (online) November 2014: http://www.brookings.edu/~/media/research/files/papers/2014/11/12-enabling-humanitarian- mobile-phone-data/brookingstechmobilephonedataweb.pdf  Chapter 4: Debatable Experimentation The chaos of humanitarian disaster often creates an implied social license for experimentation with new approaches, under the assumption of better outcomes. Vested interests dominate the public discussion of humanitarian data modeling, downplaying the dangers of what is essentially a public experiment to combine mobile network data and social engineering algorithms. In the case of using mobile network data to track or respond to Ebola, the approaches are so new–and generally so illegal– that most advocacy focuses on securing basic access to data. Advocates for the release of CDRs often paint an optimistic picture of its potential benefits, without applying the same rigor to the risks or likelihood of harm. This trades on the social license created by disaster to experiment with the lives of those affected, under the implicit assumption that it can’t make the situation worse. The problem is that personally identifiable data in the wrong hands can make many situations worse. Once released, data is nearly impossible to control or “take back”, meaning that once released CDRs create risks immediately that last indefinitely. During and after a disaster, there are substantial benefits to having access to CDRs in humanitarian and commercial contexts. The value of these data sets, and the rights of the people they represent, should increase the ethical concerns and scrutiny of access negotiated under the auspices of humanitarian and development contexts. In the Ebola response, it did just the opposite. Data modeling may have significant benefits, but most publicly funded social interventions bear the burden of proving those benefits before compromising the human rights of millions of people. To date, there simply hasn’t been nuanced enough experimentation, analysis, or debate about what factors lead to data modeling having a positive social impact that addresses specific threats or issues. The debate about the humanitarian use of data models not only has that burden not been met, there aren’t even the appropriate research, licensing, and oversight mechanisms to evaluate and protect against potential harms. Without more research, the forced release of mobile network data may not only endanger the lives of the people humanitarians seek to serve – they may expose humanitarian organizations to a new kind of legal risk. Calls for CDRs seems to gain the most traction during times of emergency, which also has the potential to set norms in circumstances that distort the cost-benefit analysis away from individual rights and agency. This chapter will explore the state of the institutional debate, in order to understand the incentives and actors involved in defining the legal and practical exercise of digital emergency powers. The Endlessly One-Sided Debate The debate over the best-fit way to collect, share, and use CDRs is still in its very early stages. The conversation about appropriate use of mobile network data, as of now, is largely comprised of single perspective advocacy pieces, each of which advance an organizational or commercial interest. The institutional debate focuses on advancing the interests of that group’s primary constituency, but fails to prove where CDR-based data modeling creates uniquely actionable enough insights to justify their release.55 Most recommendations on policy, institutional frameworks, and technological innovation focus on limiting the risk inherent in sharing of CDRs. Conspicuously absent is a critical discussion that acknowledges the experimental nature of data modeling in emergency response and social engineering, with a primary emphasis on quality control, public understanding, and human rights. Although there have been several high profile discussions at large events, the conversations that matter – the private negotiations that underpin the contracting, sharing, and use of mobile network data – tend to happen behind closed doors. That’s not uncommon for emerging areas of practice – but in the case of the compelled release of CDRs, the costs and benefits have broader public implications than typical public-private partnerships. Once given, a grant of access to data is nearly impossible to limit – data can be copied and shared in ways that no technical or legal infrastructure is able to effectively regulate. The World Economic Forum (WEF), the GSM Association, MIT, and UN Global Pulse have advanced the institutional discussion of emergency mobile network data management. Each organization has contributed instructive analyses of the operative elements of and barriers to using CDRs, with recommendations aimed at their constituent audiences. The WEF convened a group of industry experts to discuss the subject of data privacy in emergency response in November of 2014, resulting in a series of broad suggestions toward developing harmonized legal, operational, and policy frameworks to facilitate the “controlled” use of phone data by “trusted third parties.”56 The GSMA’s recommendations advocate limiting access to both information and the database itself – promoting the mobile network operator as a supervisor or privacy practices or the data processor, which shares                                                          55 A significant number of the explanations of CDR value focus on their comparative timeliness to census data – especially in places where census data is difficult to access. While that’s undoubtedly true, national censuses come with a significantly more explicit and robust consent and licensing infrastructure – as well as a publicly accountable institution in the event of abuse. While there are variations on implementation in practice, the comparative value doesn’t inherently justify the abrogation of the underlying consent requirements, licensing infrastructure, or publicly accountable management institutions. Hern, Alex, “Mobile phone records could help the fight against Ebola, study finds,” The Guardian, Technology (online) 29 October 2015: http://www.theguardian.com/technology/2014/oct/29/mobile-phone-records-help-fight-against- ebola-study-finds 56 The paper referenced was published by the Brookings Institute, but featured in the WEF’s annual event. Although there was more discussion Kendall, Jake; Kerry, Cameron F.; and Montjoye, Alexandre de. “Enabling Humanitarian use of Mobile Phone Data,” Issues in Technology Innovation (online) November 2014: http://www.brookings.edu/~/media/research/files/papers/2014/11/12- enabling-humanitarian-mobile-phone-data/brookingstechmobilephonedataweb.pdf  limited data based on specific queries.57 UN Global Pulse’s publications provide a high level review of approaches that may be useful – including mathematical anonymization, privacy frameworks, and data minimization – but conclude that the value of the insights gained exceeds the risks or threats of prioritizing privacy over use.58 Each report is a proactive institutional acknowledgment of the potential value of network data and the countervailing concerns about privacy. Variable Public Good The tension between the rights of the individual and the public good in times of emergency understandably skews toward the collective interest, but the institutional debate includes assumptions that are worth interrogating in greater depth. The core value proposition is that publicly accessible CDRs – or at least the distribution of CDRs to “trusted” organizations – will return efficiency gains in emergency response and public services that serve the public good. The institutional debate uses a small number of case studies that demonstrate the value of real-time mobility data to public service initiatives, but there’s no analysis of the underlying factors that create that value. In addition, mobile network data isn’t necessarily consistent – it can vary by continuity of SIM ownership, tower location logging (which can vary based on the availability of electricity), and consent.59 Even ignoring data quality and modeling issues, there are an enormous number of extant variables - such as responder adoption, type of humanitarian response (i.e. – civilian vs. military), and biases inherent in any statistical construction, among many others – that effect how we define or achieve public good using CDRs and data models.60 The question of whether an intervention serves the public good isn’t binary, it also raises practical ethical questions about what bias or population it favors. Focusing on digital data sources could skew the representative quality of the data and target disaster assistance resources toward communities that are capable of producing                                                          57 “GSMA guidelines on the protection of privacy in the use of mobile phone data for responding to the Ebola outbreak,” GSMA Mobile for Development (online) October 2014: http://www.gsma.com/mobilefordevelopment/wp-content/uploads/2014/11/GSMA-Guidelines-on- protecting-privacy-in-the-use-of-mobile-phone-data-for-responding-to-the-Ebola-outbreak- _October-2014.pdf   58 “Mobile Phone Network Data for Development,” UN Global Pulse (online) October 2013: http://www.unglobalpulse.org/sites/default/files/Mobile%20Data%20for%20Development%20Primer _Oct2013.pdf   59 A number of customers, for example, are able to opt-out of third-party and promotional messaging, including participation soliciting messages from international organizations. According to CellCom executive, the opt-out list is dominated by the “top of the pyramid,” automatically skewing results. Interview. Fabian Ochanda, Sales Director for CellCom. 21 September 2015. 60 According to the GSMA’s Pat Walshe, director of data privacy, operators were flooded with requests that didn’t have attached information about use case, whether data would inform or integrate with response efforts, or limitations on data use that could form the foundations of a license. Schenker, Jennifer L. “Ebola: How Big Data Failed to Help Curb its Spread,” Informilo (online) 2 March 2015: http://www.informilo.com/2015/03/ebola-how-big-data-failed-to-help-curb- its-spread/   data. These concerns get more complicated in regions like West Africa, which has significant digital and data divides between urban and rural areas. These divides not only have social policy and privacy implications – they also underline how many variables there are when experimenting with data modeling in emergency and social service engineering.61 Even Flowminder’s Dr. Bengtsson is a vocal advocate for a more nuanced and experimental approach to data modeling for social and disaster response engineering: “There’s a lot of potential, but any kind of application in public health or social engineering should be based on thousands of academic papers and decades of professional experience. In disaster response, you can maybe do a lot of quite good things early on, but then it’s a process of research and modeling and improvement… People think that you have the data and then it tells you everything, but that’s just not the case. In Nepal, we’ve had 7 PhDs working around the clock since April and everyone is still frustrated because there’s a lot of work to do and we want to improve the analysis further.”62 The variations in data model design and effectiveness may justify the call for more experimentation – but they don’t necessarily justify the application of untested or insecure approaches in fragile and vulnerable contexts.63 Not only do we not have good justifications for the application of experimental practices, we don’t have the institutional infrastructure for public evaluation and oversight of the use of CDRs. There are no publicly appointed bodies or auditing processes to assess the contextual value of a particular data model. Without transparent mechanisms, we aren’t able to measure or review whether any of the predictive models actually                                                          61 For a considerably deeper exploration of the benefits and costs of adopting algorithmic data modeling for social systems, particularly around decision-making support, consider: Colin, Jean- Noël and Rouvroy, Antoinette “Of Data and Men: Fundamental Rights and Freedoms in a World of Big Data.” Council of Europe (online) 17 September 2015 available online: http://www.coe.int/t/dghl/standardsetting/dataprotection/TPD_documents/T-PD- BUR(2015)09_Big%20data%20draft%20report%20170915_A.%20Rouvroy%20et%20J- N%20Colin_DRAFT_En.pdf 62 Flowminder’s Nepal work is not related to Ebola - it’s related to a disaster which has more migration-based implications. The quote is offered for reference on the difficulty of building useful and accurate statistical models for disaster circumstances. Interview, Dr. Linus Bengtsson, Executive Director of Flowminder. 11 September 2015.  63 The two most-cited case studies from Flowminder’s work are disaster response in the Haiti earthquake and the spread of Malaria in Kenya. Both of those examples had significant migration implications, based on population movements or vector-borne illness risk factors, respectively. In each of those cases, mobility plays a different role in designing an effective response – whereas in Ebola contact tracing, mobility data is only useful in concert with personally identifiable information. Talbot, David “Cell-Phone Data Might Help Predict Ebola’s Spread.” MIT Technology Review (online) 22 August 2014: http://www.technologyreview.com/news/530296/cell-phone-data-might-help- predict-ebolas-spread/ deliver improved outcomes. Building mechanisms that create broader understanding, trust, and critical analysis of data models, especially through the lens of public policy and human rights, will be an important part of justifying the release of CDRs for public benefit. Digital Emergency Power Although there are a significant number of ways to structure the release of CDRs, most of the public calls for openness have been direct appeals to mobile network operators and governments. In both cases, releasing personally identifiable information absent customer consent is an extra-legal action, requiring governmental sanction. During times of emergency, the government is typically the authority compelling the release or receiving CDR data. Governments can share or delegate information and assets to third parties, but usually only within limitations that attach public accountability to that delegation. Compelling the release of CDRs, no matter the purpose or use, is an exercise of emergency power – which invokes a wide range of legal issues, especially for third parties that act as quasi- governmental bodies. Calls for CDRs, even when they recognize the experimental nature of mobile data in social and public health systems, gloss over the significance of the inherent costs of facilitating that experimentation. Specifically, releasing CDRs infringes on the property and human rights of the people who generate, and therefore own, the underlying data. In addition to ownership and privacy rights, the release of personally identifiable data creates a significant and indefinite amount of risk to the individuals affected. At the moment, however, the only way to seek protection is through the legal system. The legal systems and regulatory authorities charged with monitoring and enforcing data protection laws– even when they have implementation frameworks– continue to struggle with the technological complexity and significant costs of enforcement of licensing personally identifiable information. Chapter 5: The Law   For the most part, how the humanitarian community acquires, moves, uses, stores, shares, and publishes data is likely illegal. The non-governmental use of CDRs is so illegal that most writing advocating for their use cite the law as a major obstacle for continued experimentation. Awareness does not mitigate illegality, however. The most commonly discussed legal risks draw from telecommunications, privacy, and data protection laws, but current humanitarian practice could also implicate property, libel, and due process laws. The differences and conflicts between these laws run the risk of compounding, as opposed to mitigating, the liability faced by international humanitarian organizations. An international organization can be brought before courts, tribunals, and regulatory authorities anywhere they operate– and conviction in one jurisdiction doesn’t protect that same organization from multiple suits for the same case or practice. The most common defense humanitarian data advocates offer is that CDRs are anonymized prior to sharing, and therefore aren’t subject to data protection laws. However, the impossibility of complete anonymization, particularly as more data is released, belies this argument. Commercial telecommunication regulations and data protection laws, prohibit the sharing or seizure of personally identifiable information with or by any party other than the government, especially absent licensing and enforcement mechanisms to protect those affected. While these legal protections are inconvenient for organizations seeking to experiment with emergency response contexts, they do play an important role in the protection of human and property rights. This analysis identifies and explains the most prominent legal frameworks relevant to the Ebola response in Liberia, but it is not comprehensive. Humanitarian organizations are likely subject to an enormous range of laws, regulatory regimes, and digital authorities outside of Liberia and ECOWAS that create additional causes of action, depending on the circumstances and affected parties. For example, children have heightened privacy protections in international law – meaning that any organization focusing on children may be subject to heightened scrutiny or consequence.64 Similarly, a number of legal entities – including the United States and European Union – have laws that govern the way that organizations registered within their jurisdictions treat civil tort liability, data privacy, and human rights wherever they operate. As a result international organizations and officers that receive or user of data illegally may be subject to litigation in their country of origin, as well as the country where the data was acquired. Some of those entities also have long-arm jurisdictional laws, such as the Alien Tort Claims Act, which could be applied to bring suit against mobile network operators that violate the human rights of their citizens, as enunciated in international law. These long-arm lawsuits are most likely in cases where the release, processing, or use of CDRs is alleged as a potential or partial cause of damages to a person’s health, freedoms, or identity. There is also a rapidly evolving body of law that regulates the transfer of data across national or regional boundaries, which may form the foundation of civil causes of action in a wide range of sovereign jurisdictions and non-governmental fora. Similarly, academic institutions have their own standards for treatment of personally identifying information inline with their own ethical and Internal Review Boards, which operate independently – and create separate causes of action within their designated adjudication systems. This chapter highlights some of the international treaties, domestic laws, and regulations that apply to the governmentally compelled release of CDRs in Liberia in                                                          64 These rights broadly emanate from the Universal Declaration of Human Rights, and its subsequent amendments and interpretations, including the UN Convention on the rights of the child. the context of the Ebola response. It’s important to note that the identity of the parties in question determines the cause of action, applicable laws, and venue. This analysis will focus on the causes of action available to individuals or groups of users based on the release of CDRs. This chapter will review causes of action against the mobile network operator and the Government of Liberia – the two most influential actors and likely defendants – though third party organizations could be included under domestic or international law, especially in the event. The two most likely causes of action are: (1) violation privacy and data protection; and (2) unjust deprivation of property rights. While this is an analysis of law, neither its substance nor its conclusions are intended as legal advice and anyone considering or actively involved in legal action on this or other issues should seek counsel from an appropriately qualified attorney prior to taking action. International Privacy Law The right to privacy in international law emanates from Article 12 of the Universal Declaration of Human Rights, which grants people the ability to challenge “arbitrary interference with his privacy,” a protection which is echoed in subsequent laws, like the International Convention on Civil and Political Rights (ICCPR).65 These set the conceptual tone for privacy and the right to protection from its violation, though did very little to define the concept or implementation procedures. The Charter of Fundamental Rights of the European Union added data as a core component of modern privacy protection - including a duty to protect, the requirement of equanimity in use for a lawful purpose, a right of access to data about oneself, the right to correct, and, most importantly, the requirement of user consent.66 All of this set up the most influential data protection law in the world, the Council of Europe’s Data Protection Convention 108 and its Additional Protocol.67 ECOWAS’ Supplementary Act Convention 108 is the legal precedent and foundation for the Economic Community of West African States’ (ECOWAS) Supplementary Act on Personal Data, the preeminent regional legislation that governs the collection, processing, and                                                          65 Universal Declaration of Human Rights (1948), Article 12, available online: http://www.un.org/en/documents/udhr/ and The International Convention on Civil and Political Rights (1976), Article 17 (1-2) available online: http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx 66 The Charter of Fundamental Rights of the European Union (2000), Article 8 available online http://ec.europa.eu/justice_home/fsj/rights/charter/fsj_rights_charter_en.htm 67 Greenleaf, Graham. The influence of European data privacy standards outside Europe: Implications for globalisation of Convention 108. International Dave Privacy Law, Volume 2, Issue 1 (2012) available at: http://idpl.oxfordjournals.org/ application of data.68 The ECOWAS Supplementary Act is based in part on Convention 108 and partially based on the African Charter on Human and Peoples’ Rights.69 The most relevant portions of the Supplementary Act provide for (1) The Data Protection Authority; (2) Data Processing and Controller Limitations; and (3) Data Subject Rights. The Data Protection Authority The ECOWAS Supplementary Act is one of the most formidable data protection laws in the world, architecting a framework for data rights, enforcement, and adjudication. The Supplementary Act compels the creation of a national Data Protection Authority (DPA) within each ECOWAS state, an independent, legally immune body that cannot share members with the government.70 The DPA has a broadly construed authority, including proactively informing digital service users of their rights; review emerging data collection, processing and use methods; and educate and consult stakeholders, including opinion seekers, each branch of government, and international regulators.71 The Supplementary Act specifically grants the DPA the authority to monitor and enforce human rights data protections during an emergency.72 The DPA is able to issue injunctive orders, sanctions, and fines in response to human rights violations – including the ability to prevent transfer and use of specific data processes or pieces of personally identifiable information.73 In other words, a DPA is the explicit, dedicated organization to define and police the issues raised by data collection, processes, and use during emergencies. Data Processing and Controller Limitations The Supplementary Act outlines the rights framework for the use of data – including the obligations of data processors (parties that use data) and unacceptable types of use. The Supplementary Act creates a proactive consent requirement for personal data, though it also creates exceptions for the execution of a “public interest                                                          68 Greenleaf, Graham. The influence of European data privacy standards outside Europe: Implications for globalisation of Convention 108. International Dave Privacy Law, Volume 2, Issue 1 (2012) available at: http://idpl.oxfordjournals.org/  69 Kuner, Christopher. “Extraterritoriality and the Fundamental Right to Data Protection,” Blog of the European Journal of International Law (online) 16 December 2013: http://www.ejiltalk.org/extraterritoriality-and-the-fundamental-right-to-data-protection/ 70 Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter IV. Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp-act.pdf 71 Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter IV. Article 19. Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp- act.pdf   72 Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter IV. Article 19 (3). Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas- dp-act.pdf  73 Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter IV. Article 19 (3) a-c and Article 20(1-3). Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp-act.pdf  mission or relevant to the exercise of public authority that is vested in the data controller or the third party to whom the data is disclosed,” as well as for “safeguarding the fundamental interests… of the data subject.”74 The Supplementary Act also requires proportionality and limited use provisions, ensuring that the data is obtained for “specified, explicit, and lawful purposes and shall not be further processed,” and “shall be kept for a period which shall not exceed the period required for the purposes for when they were obtained.”75 In addition to creating use limitations, the Supplementary Act prohibits receiving or processing personally identifiable data, though it creates exemptions for consent, public interest, and certain non-profit activities (although they require consent).76 The Supplementary Act imposes additional prohibitions against transmitting personally identifiable information outside of ECOWAS countries, requiring that the receiving country have commensurate data rights protections and direct notice to the DPA.77 There are also strong prohibitions against “direct prospecting, which is defined as, “any message sent, on whatever medium and of whatever nature, in particular a commercial, political, or charitable message, aimed at promoting, directly or indirectly, goods, services or the image of a person selling goods or providing services.”78 Lastly, and perhaps most determinatively, the Supplementary Act also states:                                                          74 This language is probably broadly construed enough to waive both governmental and third-party requirements for consent, provided there was a sufficiently defined and bound relationship established by the data sharing agreement between the mobile network operator and the Government. Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter V, Article 23(1) and (2)b and (2)d. Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp-act.pdf  75 The act also creates a longer term exception for research – though it doesn’t specify how consent or ongoing use limitations attach. Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter V, Article 25(1) and (3). Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp-act.pdf 76 The public purpose exemption is the most applicable here – as is its trickle down applicability to relevant third parties. There are also readings of the legal and regulatory compliance exemption that may apply. Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter V, Article 30 and 31(3),(6), and (8). Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp-act.pdf  77 Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter V, Article 36. Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp- act.pdf  78 As a prohibition, this likely creates a cause of action against any humanitarian or health organization that uses data obtained during the emergency – including photographs – as a component of their marketing, both to Liberians and to international donor relationships.  Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter V, Article 36. Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp- act.pdf  “No decision that has legal effect on an individual shall be based solely on processing by automatic means of personal data for the purposes of defining the profile of the subject.”79 The Supplementary Act creates a strong domestic ownership and user consent framework, as well as the outlines of data licensing and public purpose exemptions. The broad constructions of public purpose convey significant interpretive latitude, but also include restrictions on the influence that can be attributed to data processes. Data Subject Rights The ECOWAS Supplementary Act also establishes rights for data subjects (the party who creates the data). Data subjects are entitled to being informed, no later than the time of collection, that their data is being used, as well as the characteristics of that use.80 Subjects should be informed of the identity of the organization processing their data; the purpose of that processing; any third parties receiving personal data (or any derivative thereof); their rights to access, correct, or redact personal information; the amount of time the organization will preserve data; and the possibility of any transfer to another country.81 In addition to notice requirements – which essentially include the terms of the license that data, even if not negotiated – data subjects have the right to access personal data, to object to its use by a processor, to rectify any flaws in personal data exchanged, and to request its destruction.82 The ECOWAS Supplementary Act is the guiding framework for domestic data and digital privacy frameworks in Liberia – and was signed into law by President Ellen Johnson Sirleaf in 2010. ECOWAS treaties, human rights laws, and any disputes that result from them, are adjudicated by the ECOWAS Community Court of Justice                                                          79 The applicability of this provision relies on an adjudicators’ interpretation of the term “solely,” which is problematic for a number of reasons. The suggestive power of algorithmically constructed analyses has been noted at length and, in this specific context, Colin, Jean-Noël and Rouvroy, Antoinette “Of Data and Men: Fundamental Rights and Freedoms in a World of Big Data.” Council of Europe (online) 17 September 2015 available online: http://www.coe.int/t/dghl/standardsetting/dataprotection/TPD_documents/T-PD- BUR(2015)09_Big%20data%20draft%20report%20170915_A.%20Rouvroy%20et%20J- N%20Colin_DRAFT_En.pdf 80 Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter VI, Article 38. Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp- act.pdf  81 Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter VI, Article 38(1-8). Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas-dp-act.pdf  82 Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS, Chapter VI, Article 39-41. Abuja. 16 February 2010 (online) http://www.statewatch.org/news/2013/mar/ecowas- dp-act.pdf  (CCJ).83 The CCJ construes its jurisdiction broadly and will hear cases brought by individuals for violation of their human rights, as well as by national courts that refer domestic cases for appellate judgment based on the interpretation of ECOWAS agreements.84 In other words, individuals wishing to challenge whether the Government of Liberia’s use of data, or the third party use of data based on Government facilitation, violated their human rights could choose the CCJ as a venue. Liberian Privacy Law Liberia’s domestic legal frameworks reference privacy, but apply protections within regulatory contexts, as opposed to establishing over-arching definitions or enforcement mechanisms. The Liberian Constitution establishes a right to privacy and requires a court order for any exemptions.85 The Constitution also includes non-interference with telecommunications as a component of freedom of speech.86 The other relevant provisions in the Constitution relate primarily to detention and expropriation, though they focus on ensuring due process of law, as opposed to evaluating the downstream effects of privacy violations. Liberia also protects the specific rights of particular groups, such as children, which are implicated by the use of CDRs. Here, a significant amount hinges on whether CDRs are considered ‘personally identifiable information,’ – though, as described above, anonymization in the context of Ebola tracking or prediction is, at best, an interim state toward creating personally identifiable datasets. CDRs, even if anonymized, inevitably include additionally protected information from minors. The law most relevant to the definition, protection, and enforcement of privacy as it manifested through CDRs is the Liberian Telecommunications Act of 2007 (LTA 2007). Liberian Telecommunications Act of 2007 The LTA 2007 is the legislative foundation of Liberia’s mobile telecommunications industry, which also establishes and defines the Liberian Telecommunications Authority.87 Privacy and the protection of customer information are one of the defined Purposes of the LTA 2007, and it establishes steep punishment for the                                                          83 “ECOWAS Community Court of Justice,” Open Society Justice Initiative (online) June 2013: https://www.opensocietyfoundations.org/fact-sheets/ecowas-community-court-justice   84 “ECOWAS Community Court of Justice,” Open Society Justice Initiative (online) June 2013: https://www.opensocietyfoundations.org/fact-sheets/ecowas-community-court-justice   85 The Constitution of the Republic of Liberia (1986) Article 16 available online http://www.tlcafrica.com/constitution-1986.htm   86 The Constitution of the Republic of Liberia (1986) Article 15(b) available online http://www.tlcafrica.com/constitution-1986.htm  87 Liberian Telecommunications Act of 2007 available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf  violation of privacy – such as removing the license of a mobile network operator.88 In addition, the LTA 2007 specifically prohibits mobile network operators from collecting, using, maintaining, or disclosing customer data except as necessary to bill that customer – and even then, only for a period of 12 months.89 The LTA 2007 also requires that a mobile network operator disclose any and all purposes for data collected to the user in advance and, unless otherwise provided for by law, get consent.90 One reading of the LTA 2007 suggests that it is illegal to collect, use, or maintain tower-based location data as it correlates to individual accounts, regardless of whether it is ever shared with the Government or a third-party. Assuming that it is legal for mobile network operators to collect, use, and maintain location records attached to specific user accounts, the operative questions of law relate to informed user consent prior to collection and the justification of sharing those records with the Government. Absent written consent, mobile network operators are explicitly prohibited from sharing identifying information with anyone other than the government – making all direct information sharing with third parties (like international organizations or NGOs) illegal.91 This also means that absent government intervention, any customer that can prove that their data was shared with a third party can bring suit against the responsible mobile network operator.92 In addition to court-imposed sanctions, the Liberian Telecommunications Authority can levy punitive fines against any mobile network operator found to violate this law, independent of damages assessed to an individual plaintiff. Consent Requirements                                                          88 Liberian Telecommunications Act of 2007, Section 3(g) and 20(1)(b-d) available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf  89 This raises separate legal questions about whether location data is necessary to provide accurate billing statements to customers – and whether there is a distinction between pre-paid and post-paid customer billing requirements. The significant majority of the Liberian mobile customer base operates on pre-paid accounts, meaning that there are no contracts and that billing is done through deduction against a standing balance. In these billing relationships, there is no line-item presentation of calls or communications, and therefore no obvious need to have location data. Tower records are, of course, necessary and valuable for the overall operation and maintenance of mobile services, but not as they attach to any form of single user or account. In order to understand user movement, however, location information would need to attach to a single account, which means that correlation identifies it as customer data, not network maintenance data. Liberian Telecommunications Act of 2007, Section 48(3) and 49(1-3) available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf  90 Liberian Telecommunications Act of 2007, Section 49(1-3) available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf 91 Liberian Telecommunications Act of 2007, Part X, Section 49(1) available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf 92 In the event that customers are unable to resolve their dispute with the mobile network operator, they may refer the matter to the LTA for mediation prior to or in lieu of bringing a case before the court. Liberian Telecommunications Act of 2007, Part XV, Section 74(1) available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf The LTA 2007 includes a number of informed consent requirements, including providing clear data collection and use purposes and limitations.93 Contrary to the terms of the LTA 2007, neither of Liberia’s major mobile network operators explicitly provide their mobile Terms of Service Agreements on their websites.94 Further, pre- paid service customers, which make up the majority of the subscriber base, don’t sign Terms of Service Agreements.95 Even when customers do receive Terms of Service Agreements, they don’t include any notifications or limitations on data use.96 As a standalone practice, this is a violation of the LTA 2007, as well as nearly every subsequent piece of legislation that affords user rights, like the Consumer Bill of Rights and the New Consumer Guidelines.97 The absence of Terms of Service Agreements, both in typical business practices, as well as on their websites, is an explicit violation of the LTA 2007.98 Further, failing to inform a customer about any purpose for data collection makes it illegal for a mobile network operator to collect maintain or share any information that is not otherwise required by law. Without even boilerplate legal language establishing “any legal purpose” use, it’s not clear that mobile network operator data collection that falls outside of SIM card registration or billing requirements is legal. It’s important to separate the legality of collection, use, and maintenance from the legality of sharing – both of which require consent. However, if a mobile network operator doesn’t have consent for the former, questions of the legality or definition of sharing practices become moot, except as additional violations. Government Intervention The LTA 2007 creates broad rights for the Government of Liberia to access customer information, although these rights are largely subject to emergency                                                          93 Liberian Telecommunications Act of 2007, Part X, Section 49(1) available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf 94 As reviewed 31 September 2015. Lonestar MTN available online: http://www.lonestarcell.com/ and CellCom available online: http://www.cellcomgsm.com/  95 Interview. Fabian Ochanda, Sales Director for CellCom. 21 September 2015.    96 Based on Terms of Service Agreements received from Liberian operators, confirmed by the interview with Fabian Ochanda. Interview. Fabian Ochanda, Sales Director for CellCom. 21 September 2015.   97 The Consumer Bill of Rights includes the following language: “Consumers must be protected from improper use of information by service providers in the course of providing telecommunications service. It is required of service providers to protect the privacy of financial, personal, and other confidential information on consumers…”  Liberian Telecommunications Act of 2007, Part X, Section 51 available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf; New Consumer Guidelines (18 March 2013) available online: http://www.lta.gov.lr/doc/New%20Consumer%20Guidelines%20.pdf; and Consumer Bill of Rights (18 March 2013) available online: http://www.lta.gov.lr/doc/Consumer%20Bill%20of%20Rights%20.pdf   98 Liberian Telecommunications Act of 2007, Part X, Section 55-56 available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf  exemptions and criminal due process.99 The Ebola epidemic is an exceptional circumstance in that it skirts the line between a national security priority and a declared public health emergency, which are the two included types of emergency powers. In the event of a national security threat, Government access to private information requires an order from the Attorney General – though once issued, it creates completely unfettered access to a mobile network operator’s infrastructure with complete indemnification.100 Powerfully, the Attorney General can grant real- time access to the mobile network operator’s database, which is neither anonymized nor filtered to a specific type of data. This authority could also conceivably create the freedom to share information with third party service providers or responders, though there is no explicit language or precedent to inform the decision either way. Similarly, there is nothing to suggest that the Attorney General of Liberia issued an order during the Ebola epidemic to let this happen, although it was within his authority to do so. In the event of an emergency, the LTA 2007 gives the Ministry coordinating the emergency response the authority to create rules for the provision of telecommunications services, but does not grant the same, direct access to mobile network operator infrastructure.101 The invocation of public emergency powers also does not indemnify the mobile network operator or the Government from human rights abuses. Emergency power invocation also enables mobile network operators to submit an application for cost-recovery based on any expenses or operational costs incurred as a part of the response.102 Interestingly, in the case of the Ebola response, the legal authority conferred to the Government is limited to the Ministry coordinating the response – namely the Ministry of Health, not the LTA. This is likely an insignificant distinction, but does raise the question of the intended legal role of the LTA as a component of the disaster response infrastructure. The use of emergency powers does not explicitly create the authority to share information with third party organizations, nor does it protect any organization involved from subsequent litigation. The Data Protection Authority That Wasn’t By virtue of its participation in the ECOWAS Supplementary Act, the Government of Liberia is obligated to create a Data Protection Authority, with the full mandate, operational authority, and enforcement powers described above. The LTA has draft legislation that has gone through significant drafting and review, though it has never                                                          99 Liberian Telecommunications Act of 2007, Part X, Section 52 and Part XIV Sections 69-71 available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf  100  Liberian Telecommunications Act of 2007, Part X, Section 52 and Part XIV Sections 69-71 available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf  101  Liberian Telecommunications Act of 2007, Part XIV Sections 70 available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf  102  Liberian Telecommunications Act of 2007, Part XIV Sections 70(2) available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf  been implemented.103 This Authority, as established, provides significant legal and operational clarity to data protection practices in Liberia, especially during times of emergency. As it stands, according to the Honorable Angelique Weeks, Chairwoman of the LTA, “There are no [specific] regulations in place for data privacy.”104 Liberian Property Rights In addition to the legal framework provided by privacy and human rights law, CDRs are a commercial product that could be considered property. There is very little precedent for this type of adjudication, but the given degree of global data commercialization, there’s little to suggest that CDRs wouldn’t create a property rights interest. A more contentious question is whether that property rights interest exists for the mobile network operator, the customer, or both parties – and whether anonymization affects those rights. If a customer does have a property right in their data, mobile network operators would not have a legal right to share CDRs with third parties absent informed consent. The Constitution of Liberia provides both for the inviolability of private property and for the expropriation authority of the Government.105 Although originally intended for “real property,” meaning land, the expropriation authority is applicable to the release of CDRs, but it imposes several additional requirements: (1) justification for the expropriation given to the owner; (2) prompt payment of just compensation; (3) the free right to challenge in a court; and (4) a reversion to the owner at the end of use.106 In other words, Governmental expropriation of property is legally provided for, but subject to typical due process requirements. Liberia also has a Public Health Law, which extends the right of expropriation to include unused supplies, which could very easily be interpreted to apply to CDRs – provided that they were proven to useful to the emergency response effort.107 The application of expropriation requirements would significantly slow the process of releasing CDRs, as well as creating several difficult logistical challenges. It may be that expropriation justifications don’t require measures of necessity or proportionality – but owners of the data could certainly challenge the validity of the data models employed or the availability of migration data through less invasive means. Even if the use of CDRs were determined to be necessary, that judgment                                                          103  Interview. Angelique Weeks, Chairwoman of the Liberian Telecommunications Authority. 25 September 2015. 104 Interview. Angelique Weeks, Chairwoman of the Liberian Telecommunications Authority. 25 September 2015.  105  The Constitution of the Republic of Liberia (1986) Article 20 and 24 available online http://www.tlcafrica.com/constitution-1986.htm  106  The Constitution of the Republic of Liberia (1986) Article 24(a)(i-iv) available online http://www.tlcafrica.com/constitution-1986.htm  107 Public Health Law (1976) Article 14 available online http://www.fahnbulleh.net/docs/lr_public_health_law.pdf then puts the court or the Government of Liberia into the unique position of assessing the independent value of CDRs data. Similarly, it is nearly impossible to enforce limitations in the use of raw data – especially data intended to be shared amongst a wider group of people – raising questions around the right of reversion or first refusal after the epidemic. For the purposes of this analysis, should the Government compel the release of CDRs, both mobile network operators and customers could bring suit against the Government for any failure to comply with the due process requirements involved. Ultimately, the legal theories involved – whether privacy or property protections – hinge on questions of user consent or the application of due process in the extraordinary application of emergency powers. As demonstrated by the example of what actually happened, these theoretical and legal questions are less likely to determine the outcome than the practical structures in place to implement, oversee, and enforce the use of CDRs for the public good. In the throes of the Ebola epidemic, it’s clear that there wasn’t capacity to consider or the mechanisms to manage the significant data privacy, ownership, and licensing issues raised by the operational requirements of an increasingly digital disaster response community. Despite that, it is equally clear that understanding the enforcement systems for existing laws and privacy frameworks is a fundamentally important part of building a functional, digital disaster response ecosystem. Chapter 6: The Law Inaction   Institutions and legal systems charged with protecting individual rights in digital spaces have been slow to adapt to evolving jurisprudence. The judicial bodies with the most relevant authority understaff regulatory agencies or international human rights enforcers, which most victims struggle to access. Even under the best of circumstances, resolving disputes that arise out of the large- scale use of sensitive data without user consent is complicated. The majority of cases to date have come from commercial breaches caused by the illegal exploitation of security vulnerabilities in digital systems. The underlying issues become even more complicated when they involve government actions or complicity in sharing sensitive data with third parties in violation of its own law, without user consent. We don’t have any sense for the size of emergency required to necessitate a government’s use of digital emergency powers. Similarly, there are not established professional or data security standards for data protection that may provide protection against negligence actions – an issue raised by the recent hacking of the United States’ Office of Personnel Management, which resulted in the exposure of the personally identifiable records of more than 19 million people. The issues involved are complex enough that they don’t benefit from precedent in any specific jurisdiction, let alone usable examples in an international or emergency context. These issues get even more complicated during times of crisis, when a Government compels or is complicit in the use of potentially sensitive information to mitigate the effects of an international epidemic. Lack of institutional capacity, legal precedent, or procedural clarity do not protect any of the organizations involved, nor are they a defense if an individual or group of people whose rights have been violated should choose to bring suit. These factors contribute to the uncertain and potential liability currently facing the governments, mobile network operators, and international organizations involved in international disaster response. This Chapter examines the practical issues and legal mechanisms to resolve the disputes and lawsuits that could arise from the collection, use, or sharing of CDRs – or other personally identifiable information - during the Ebola response in Liberia. Practical Issues At a practical level, demonstrating harm from the aggregated release of data, especially data that has gone through anonymization and re-identification, is extremely difficult. The types of harms that could result are both difficult to predict and difficult to measure. For example, if data is released and then subsequently used to misallocate disaster response resources, it would be nearly impossible to prove to a legal standard that those resources would have otherwise been properly allocated. Similarly, if CDRs are maintained by a humanitarian organization and used for commercial advantage in a subsequent procurement process that grants improper favor in a competitive process, it would be almost impossible for the original source of the data to know, let alone prove harm. Data is inherently difficult to track once released, as are the terms of the original license, prohibitions against international sharing, or determining the appropriate jurisdiction in which to bring suit. These are all issues that point to the need for an independent, proactive data management body, whose mandate enables them to determine the operational, commercial, and legal context for sharing sensitive information. That is not, however, to suggest that Data Protection Authorities are a comprehensive solution. Fundamentally, creating an ethical and legal ecosystem that provides for informed consent, transparency, and meaningful user agency will require significant changes to commercial and public legal infrastructure. The following are four practical principles that should underpin any determination of the release of CDRs in future emergencies. Consent From a legal perspective, informed consent is the most powerful and pervasive tool to ensure the legality of information sharing. The principle appears in nearly every level of legal construction, beginning with commercial contracting and rising all the way to international human rights protections. The fundamental tension is that informed consent requires reasonable structures for limitation and enforcement. Looking, for example, at organ donor programs, broadly stated purposes and exemptions with strongly defined chains of custody and systems of management have created an essentially safe mechanism for people to share some of their most important property. Every person has the independent and legally legitimate right to share their information and there’s no question that, faced with a global health pandemic, many people would voluntarily share information about themselves in order to improve the response effort. Obtaining consent at point of collection is both a legal requirement in the Liberian context and a commercial practice that has significant precedent for less altruistic means. There is no question that building emergency data use clauses into commercial and public service contracts is both the most straightforward and the most legal way to facilitate the sharing of CDRs, and minimizes virtually every other question that the law compels. Regulatory Validation Data modeling is a fundamentally uncertain science, despite the tremendous gains it has the potential to add to our most vital systems. At present, though, our understanding of this process is so nascent that it raises a huge need for public and transparent validation processes before being employed in social and disaster engineering. Nearly every product brought to market that has the potential to affect public health, let alone emergency response, is subject to some degree of testing and regulation to ensure quality. This is typically done prior to use and in environments that graduate or mitigate risks through successive iterations. There are few good arguments that data modeling should not be subject to the type of research and development testing that is applied to public institutions or resource allocation. Absent validation, nearly every legal argument that enables the sharing of personal data fails, because there is no proof of benefit to counterbalance the very real costs involved. This isn’t to suggest that there isn’t value, rather that until it’s proven and given character by independent and transparent processes, it will be subject to doubt, abuse, and significant legal challenges. Necessity and Proportionality Two of the most common challenges to a “public good” action are necessity and proportionality. Necessity is the idea that the action taken – in this case, the sharing of personally identifiable data without user consent – was necessary to achieve the desired goal. Necessity builds on the need for regulatory validation, because it explains the role that CDRs play in the overall model and also shows that there were not viable alternatives. In the case of the Ebola epidemic, responders alleged that real-time mobility information was necessary in order to optimize the allocation of response resources and contain the virus. Supporters of this thesis would rightfully point to the fact that this data simply doesn’t exist in other formats and that the goal of containment is more than enough to justify the use of that data. Skeptics of this thesis would question whether real-time, aggregated migration data actually improves the understanding of the spread of a contact-based disease, whether the quality of the data could distort response efforts toward the digitally connected, and whether any of the involved institutions had the means to operationalize whatever insights might have emerged from the model. During the Ebola epidemic, the intentions of the organizations requesting data largely substituted for necessity justifications – which were often effective in securing data, but not in a way that provides any legal defense. Proportionality is the principle of ensuring that the potential benefit of an action is proportional to the potential negative consequences of that same action. It seems like a straightforward balancing test, but it quickly becomes convoluted, particularly when neither the benefits nor consequences are known. Fundamentally, real-time pipelines into mobile network operator infrastructure are some of the most powerful data assets in the world, and there simply isn’t much information about what governments, let alone international organizations, will do with that kind of access. The early indications provided by intelligence agencies and public health authorities suggest at least the potential for the large-scale violation of basic freedoms. While it may seem melodramatic, Liberia has experienced two large civil wars in the last 25 years – and the potential for blurring humanitarian and national security justifications for data use has very high stakes. Proportionality as a principle fundamentally only works when there are clear values and processes to establish the value of CDR use to justify the use of real-time data infrastructure – which is different than recognizing the enormity of a threat. In the uncertainty and panic that arose from the Ebola epidemic, the international community recognized the potential threat of the outbreak, but there was very little discussion around the proportionality of seizing CDRs. Similar to necessity, proportionality is not a bright line standard, but it is a balancing test that is often used to assess the legal validity of the actions of Governments and international actors during times of emergency. Legal Mechanisms The viability of legal enforcement mechanisms is, ultimately, the primary determining factor in whether our rights are protected by the laws we put in place. This analysis focuses on the available causes of action to a citizen of Liberia, who is a mobile network customer whose CDRs were shared with the Government. As mentioned above, depending on the particular actors in any specific fact pattern, there may be a wide range of additional legal mechanisms and venues available. CDRs that were shared with international organizations or transported across international borders, especially outside of ECOWAS member countries, would create additional causes of action before other courts. One of the major challenges in bringing a suit, in addition to those stated above, is that it is extremely difficult to define an appropriate penalty or resolution. There aren’t commercially established rates for CDR data, and certainly not ones that are likely to have significance at an individual level. In addition, privacy violations are difficult to quantify in terms of damages, so a litigant is likely to be left with speculative or punitive damages, which most courts are likely to be hesitant to levy against their own government. Ultimately, there are four places that a Liberian citizen can go to seek redress: (1) customer service; (2) the LTA; (3) Liberian court; and (4) the ECOWAS CCJ. Although each could be escalated from one venue to the one after it, it’s also possible to bring a case of first impression in each. Customer Service There are a number of pieces of Liberian telecommunications regulation that require mobile network operators to have dispute resolution processes, including the LTA 2007, the New Consumer Guidelines, and Consumer Bill of Rights.108 Though the mechanisms exist, it’s not entirely clear what kind of liability a mobile network operator bears in complying with a Government order, or what kind of redress they could offer. The best-fit causes of action against a mobile network operator would likely emanate from the way they collect, use, and maintain data – or, if a litigant could prove it, the sharing of data with a third party organization absent government influence. That said, Customer Service would be a disadvantageous venue in which to bring a serious case. An optimistic outcome would be an improvement in Terms of Service Agreements or overall transparency in data practices. Liberian Telecommunications Authority The LTA 2007 and supporting legislation gives the LTA a broad authority to hear and adjudicate disputes between customers and service providers, including a relatively granular structure for complaint submission and processing.109 The LTA has the broadest available authority in relation to punishing mobile network operators, and can do anything from levying fines to imposing injunctive relief to removing the license altogether. Although the LTA requires good faith negotiation between parties in advance of being willing to hear most cases, it is also able to issue binding opinions. The authority of the LTA, understandably, doesn’t reach to                                                          108  Liberian Telecommunications Act of 2007, Part X, Section 51 available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf; New Consumer Guidelines (18 March 2013) available online: http://www.lta.gov.lr/doc/New%20Consumer%20Guidelines%20.pdf; and Consumer Bill of Rights (18 March 2013) available online: http://www.lta.gov.lr/doc/Consumer%20Bill%20of%20Rights%20.pdf  109 Regulations for the Treatment of Confidentiality, Dispute Resolution Compliance, and Enforcement (2009) available online: http://www.lta.gov.lr/doc/Confidentiality%20_%20Dispute_Compliance%20regulation.pdf being able to sanction the Government for telecommunications-related violations of human rights. If a customer is challenging such an action, they are likely challenging the LTA, so are best served in a more neutral venue. The LTA is an ideal venue, however, to challenge mobile network operator Terms of Service Agreement standards, the legality of their data collection, and any provable sharing of CDRs with third parties. Similarly, the LTA would likely have at least an advisory role in determining whether CDRs qualified as property, related to questions around the validity of expropriation claims. Liberian Courts Liberia’s court system is a microcosm of a wide range of institutional challenges, in a country beset by a significant amount of instability in the last few decades. Liberian courts have received significant criticism for their treatment of prisoners, human rights, and due process. As compared to other regional court systems, Liberia does well in limiting government powers and ensuring fundamental rights, which bodes well for potential litigants.110 It fares far less well in regulatory enforcement, civil justice, and corruption indicators – all of which would be materially involved in any case brought against a mobile network operator or the Government related to the use of CDRs during the Ebola outbreak.111 Although a Fig ur e 3 Liber ia R ank ing i n the Wo r ld J us tice Liberian mobile network customer could bring P ro ject's Rule o f Law Index 20 1 5 almost any of the available causes of action to a Liberian court, like most civil systems, the available remedies are primarily financial. Similarly, although the ECOWAS Supplementary Act was ratified by Liberia, there isn’t much precedent to suggest an obvious outcome or available redress. ECOWAS Community Court of Justice The CCJ determines admissibility of cases, although it specifically does hear human rights cases of individuals against their government. In addition, the CCJ has a wide range of available remedies, including the ability to compel a government to change a practice or fulfill an obligation under ECOWAS law. As a result, CCJ won’t hear an                                                          110  Liberia. The World Justice Project’s Rule of Law Index (2015) available online: http://data.worldjusticeproject.org/#/groups/LBR  111  Liberia. The World Justice Project’s Rule of Law Index (2015) available online: http://data.worldjusticeproject.org/#/groups/LBR  individual’s case against a mobile network operator – but would be able to adjudicate violations of privacy and, potentially, the validity of due process implementations of an expropriation process. In the case of the Ebola epidemic, any theory of expropriation would likely need a more tangible fact pattern to justify a due process case. However, given the state of the Liberia’s implementation of its Data Protection Authority – and the availability of ECOWAS as an adjudicator of specific issues arising from the Supplementary Act – there’s a solid likelihood that the CCJ could compel both punitive damages for privacy violations and investment in the institutional infrastructure to guide future seizures or requests for CDRs. Conclusion   The international digitization of disaster response raises a range of urgent issues that need attention, coordination, and action from every group involved. Although these issues are complex, the current state of digital coordination, human rights protections, and disaster experimentation create significant harm for the world’s most vulnerable people and significant liability for some of the world’s best organizations. Defining the digital exercise of emergency powers, regulating the experimental application of data models in humanitarian settings, and protecting the rights of vulnerable populations during times of crisis are some of the most important issues of modern humanitarianism–and there won’t be easy answers. What there will be, in the meantime, is the risk that these issues will get settled through courtrooms instead of consultative and participatory processes. The thing no organization operating in a fragile or international context can do anymore, is ignore the practical, technological, and legal steps necessary to build digital systems that truly do no harm. The Ebola epidemic in West Africa was one of the worst health crises in modern history, and it exposed a wide range of traditional and emergent issues in the way that international organizations, governments, and commercial organizations manage the growing digitization of disaster response. The public health infrastructure in Liberia was unprepared for, and incapable of containing, the outbreak of the Ebola virus. The international response was dangerously slow, and when it intervened, it initially compounded communication challenges. The failure to communicate became the characterizing narrative of the outbreak and rather than focus on centralizing coordination, a large number of actors intervened. Coordination runs counter to most people’s instincts in disaster and takes time, which is in short supply – particularly when the death toll is rising. Hundreds of individuals, donors, governments, and response organizations mobilized, pouring disembodied information systems, resources, and people into an already chaotic operational context. Each effort, though, ultimately needed either institutional response or operational capacity to have impact – straining Liberia’s already overwhelmed management and coordination infrastructure. Within that context, response efforts factionalized and regionalized in an effort to manage the signal-to- noise ratio. The result was patchwork reporting, incompatible information infrastructure, disconnected operational efforts, and significant tension with the Government of Liberia. Rather than focus on building integrated coordination systems, the calls from the international community pushed for an increase in the availability of data – under the presumption that open and interoperable data systems could improve response capacity. Universal availability of information, while a potential improvement, does nothing to harmonize disparate definitions, assign administrative permissions, or attribute comparative reliability. These core needs are the foundations of functionally scalable information architecture – but they are not primarily technology problems, they are coordination problems. To that end, pushing for decentralized information systems has the potential to undermine the ability of central actors to coordinate and manage operations. The request for CDRs, the most invasive request for data, challenged more than good practice in humanitarian response, it pushed for expropriation of direct access to some of the most sensitive databases in the world. Although there are interim states of anonymization of that data that could mitigate some of the risk to its subjects, the data models it would be used in are still extremely experimental. In addition, nearly every described use of CDRs requires some form of re-identification or correlation with datasets that fall under the definition of “personally identifiable,” triggering a wide range of privacy laws and risks. Although a number of the requests made recognize the implications and complications posed by the release of CDR data, very few acknowledge existing data protection laws or the experimental nature of the justification for the expropriation of personal information. Although this is not the first time that disaster response operations have been used to justify investment in untested approaches, it is one of the most invasive. Unlike many other forms of experimentation that happen during emergency responses, data lasts forever. It is also almost impossible to track or control once released. Not only is it premature to ascribe value to the abrogation of the privacy of millions of people, it’s impossible to how far or for how long those datasets may pose a risk to the people they identify. There simply aren’t yet strong enough global technological, operational, organizational, legal, or economic mechanisms in place to measure the benefits or manage the risks involved. The laws that do exist to govern this type of data request suggest that this kind of expropriation, undertaken without any form of due process, would be illegal. Given the novelty of the request, there’s no precedent for this type of data seizure, nor is there any certainty that the available enforcement mechanisms have the capacity or the requisite independence to evaluate the costs or benefits of such a practice. What is certain is the growing interest and willingness of a wide range of actors to take advantage of these datasets during the periods of panic surrounding emergency – often in ways that limit fundamental freedoms with the threat of force. As so often happens when confronted with potential – especially in emergency – the international community underestimated the present and future risks of using CDRs and data modeling to guide disaster response. There is little question that the use of appropriate data to feed the operations of a well-coordinated response effort has significant potential to reduce human suffering. But that potential is far from realized, and if we’re going to realize it, we’ll need to build the institutional coordination, mathematical validation, and legal rights frameworks so that the benefits of digitization evolve alongside our ability to control them. The response to the Ebola epidemic raised a wide range of important issues in modern disaster response, but it didn’t acknowledge or respect the rights of the people it meant to serve. For that reason, West Africa’s Ebola epidemic – and Liberia’s experience with it – was a big data disaster. Recommendations   In order to build a supportive and safe space in which to design, test, and implement strong data modeling frameworks for social engineering and disaster response, there will need to be engagement at a range of levels. The following are a top-level series or recommendations, though they are by no means comprehensive: International Organizations 1. Invest in transparent and publicly accessible experimentation infrastructure for data modeling applied to social issues or circumstances. Determine appropriateness criteria based on relevance, risk, and confidence thresholds. Create public engagement systems around the governance of these models. 2. Treat information architecture like treaties, proposing globally usable systems and structures, which are ratified, approved, and implemented at the national level. Publicly document variations based on local infrastructure. 3. Require regular reporting to local institutions as an indicator of compliance and impact, with set thresholds as requirements for the release of follow-on funding or eligibility for subsequent awards. 4. Include standard indicator definitions and technological interoperability as a procurement requirement for humanitarian response organizations. Ideally, these would be coordinated between donors and universally applied. National Governments 5. Establish public information data licensing templates, including purpose requirements, use limitations, and enforcement frameworks. Keep records of adherence and use good faith as a determining factor of future access. 6. Establish clearer intermediary liability and emergency power doctrines, as applied to digital information. Also build clearer frameworks to establish the limits, gradients, and independent review of emergency authority renewals. 7. Implement EU and ECOWAS “style” Data Protection Authorities, with proactive enforcement mandates and powers. Commercial and Digital Service Providers 8. Explicitly include data licensing terms in agreements with end users, including dispute resolution clauses, emergency circumstance requirements, and remedies in case of violation. 9. Include an opt-in “data donor,” program that enables users to proactively contribute their data to selected research institutions, charities, and/or emergency response organizations. 10. Build relationships with international human rights enforcement bodies, in order to be able trigger or report third party abuses.

References (16)

  1. "GSMA guidelines on the protection of privacy in the use of mobile phone data for responding to the Ebola outbreak," GSMA Mobile for Development (online) October 2014: http://www.gsma.com/mobilefordevelopment/wp-content/uploads/2014/11/GSMA-Guidelines-on- protecting-privacy-in-the-use-of-mobile-phone-data-for-responding-to-the-Ebola-outbreak- _October-2014.pdf 58 "Mobile Phone Network Data for Development," UN Global Pulse (online) October 2013: http://www.unglobalpulse.org/sites/default/files/Mobile%20Data%20for%20Development%20Primer _Oct2013.pdf
  2. A number of customers, for example, are able to opt-out of third-party and promotional messaging, including participation soliciting messages from international organizations. According to CellCom executive, the opt-out list is dominated by the "top of the pyramid," automatically skewing results. Interview. Fabian Ochanda, Sales Director for CellCom. 21 September 2015.
  3. For a considerably deeper exploration of the benefits and costs of adopting algorithmic data modeling for social systems, particularly around decision-making support, consider: Colin, Jean- Noël and Rouvroy, Antoinette "Of Data and Men: Fundamental Rights and Freedoms in a World of Big Data." Council of Europe (online) 17 September 2015 available online: http://www.coe.int/t/dghl/standardsetting/dataprotection/TPD_documents/T-PD- BUR(2015)09_Big%20data%20draft%20report%20170915_A.%20Rouvroy%20et%20J- N%20Colin_DRAFT_En.pdf
  4. Flowminder's Nepal work is not related to Ebola -it's related to a disaster which has more migration-based implications. The quote is offered for reference on the difficulty of building useful and accurate statistical models for disaster circumstances. Interview, Dr. Linus Bengtsson, Executive Director of Flowminder. 11 September 2015.
  5. The two most-cited case studies from Flowminder's work are disaster response in the Haiti earthquake and the spread of Malaria in Kenya. Both of those examples had significant migration implications, based on population movements or vector-borne illness risk factors, respectively. In each of those cases, mobility plays a different role in designing an effective response -whereas in Ebola contact tracing, mobility data is only useful in concert with personally identifiable information.
  6. Talbot, David "Cell-Phone Data Might Help Predict Ebola's Spread." MIT Technology Review (online) 22 August 2014: http://www.technologyreview.com/news/530296/cell-phone-data-might-help- predict-ebolas-spread/
  7. Universal Declaration of Human Rights (1948), Article 12, available online: http://www.un.org/en/documents/udhr/ and The International Convention on Civil and Political Rights (1976), Article 17 (1-2) available online: http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx
  8. The Charter of Fundamental Rights of the European Union (2000), Article 8 available online http://ec.europa.eu/justice_home/fsj/rights/charter/fsj_rights_charter_en.htm
  9. Greenleaf, Graham. The influence of European data privacy standards outside Europe: Implications for globalisation of Convention 108. International Dave Privacy Law, Volume 2, Issue 1 (2012) available at: http://idpl.oxfordjournals.org/
  10. "ECOWAS Community Court of Justice," Open Society Justice Initiative (online) June 2013: https://www.opensocietyfoundations.org/fact-sheets/ecowas-community-court-justice
  11. "ECOWAS Community Court of Justice," Open Society Justice Initiative (online) June 2013: https://www.opensocietyfoundations.org/fact-sheets/ecowas-community-court-justice 85 The Constitution of the Republic of Liberia (1986) Article 16 available online http://www.tlcafrica.com/constitution-1986.htm 86 The Constitution of the Republic of Liberia (1986) Article 15(b) available online 93 Liberian Telecommunications Act of 2007, Part X, Section 49(1) available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf
  12. As reviewed 31 September 2015. Lonestar MTN available online: http://www.lonestarcell.com/ and CellCom available online: http://www.cellcomgsm.com/
  13. Interview. Fabian Ochanda, Sales Director for CellCom. 21 September 2015.
  14. Based on Terms of Service Agreements received from Liberian operators, confirmed by the interview with Fabian Ochanda. Interview. Fabian Ochanda, Sales Director for CellCom. 21 September 2015.
  15. The Consumer Bill of Rights includes the following language: "Consumers must be protected from improper use of information by service providers in the course of providing telecommunications service. It is required of service providers to protect the privacy of financial, personal, and other confidential information on consumers…" Liberian Telecommunications Act of 2007, Part X, Section 51 available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf; New Consumer Guidelines (18 March 2013) available online: http://www.lta.gov.lr/doc/New%20Consumer%20Guidelines%20.pdf; and Consumer Bill of Rights (18 March 2013) available online: http://www.lta.gov.lr/doc/Consumer%20Bill%20of%20Rights%20.pdf
  16. Liberian Telecommunications Act of 2007, Part X, Section 55-56 available online: http://www.lta.gov.lr/doc/LiberiaTelecommunicationsAct.pdf