Anti-terrorism measures: Censoring the web, making us less secure
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 10 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/40476 (DOI) | |
Publisher | ||
Release Date | ||
Language | ||
Producer |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
1
10
00:00
Internet forumInternetworkingEvent horizonComputer configurationRight angleTwitterWeb 2.0Projective planeDirection (geometry)Basis <Mathematik>Process (computing)Content (media)BitRegulator geneFraction (mathematics)MeasurementMereologyMultiplication signComputer configurationSinc functionInterior (topology)WaveEvent horizon1 (number)Internet forumRow (database)Information privacyGoodness of fitLevel (video gaming)Group actionState of matterDigitizingInformation securityDecision theoryPhase transitionTable (information)ImplementationDreizehnInformation technology consultingAddress spaceWeightObservational studyData managementAssociative propertyForm (programming)Expert systemCASE <Informatik>Roundness (object)Different (Kate Ryan album)Self-organizationCivil engineeringSlide ruleSet (mathematics)CatastrophismMessage passingLoginComputer animation
09:36
Manufacturing execution systemGroup actionPosition operatorInformation privacyIntegrated development environmentInheritance (object-oriented programming)State of matterMeasurementResultantVotingComplete metric spaceElement (mathematics)Computer animation
11:25
System programmingInformationEncryptionInternetworkingGamma functionParameter (computer programming)CASE <Informatik>Regulator geneBasis <Mathematik>Prisoner's dilemmaDirection (geometry)WordTable (information)Group actionEncryptionRadical (chemistry)AreaInternetworkingTelecommunicationMassFigurate numberInformation systemsScaling (geometry)Instance (computer science)Physical lawExpressionFacebookProfil (magazine)CybersexComputer animation
14:24
Service (economics)Group actionInternetworkingState of matterContent (media)Context awarenessWeb pageBlock (periodic table)NumberWordDirection (geometry)Interpreter (computing)Web 2.0AdditionExpert systemMeasurementSpeech synthesisOrder (biology)InternetworkingPoint (geometry)State of matterView (database)Rule of inferenceGroup actionPhysical lawService (economics)Internet service providerQuicksortWeb pageRight angleDependent and independent variablesContent (media)FacebookPosition operatorExpressionGoogolTwitterSoftwareBlock (periodic table)Traffic reportingComputer animationLecture/Conference
16:54
Direction (geometry)RandomizationWeb 2.0QuicksortBasis <Mathematik>Group actionMereologyComputer animation
17:24
EncryptionState of matterSocial softwareInternetworkingTelecommunicationProxy serverServer (computing)Computer networkSatelliteLink (knot theory)Mathematical analysisData storage devicePoint cloudArithmetic meanTelecommunicationCASE <Informatik>Context awarenessEncryptionMereologyTable (information)Conservation lawSoftware bugLevel (video gaming)State of matterIntercept theoremVotingBackdoor (computing)Lecture/Conference
18:45
Message passingEmailEncryptionFile Transfer ProtocolType theoryInformation securityVisual systemComputer-generated imageryCategory of beingTelecommunicationInformation privacyInformation securityEncryptionIntercept theoremState of matterTelecommunicationMedical imagingGoodness of fitMeasurementExterior algebraExtension (kinesiology)Visualization (computer graphics)Right angleTrojanisches Pferd <Informatik>Information privacyLine (geometry)Computer animationLecture/Conference
20:28
InformationSystem programmingPoint (geometry)Information securityInformation systemsTraffic reportingAuthorizationQuicksortVulnerability (computing)Information securityMereologyDirection (geometry)Dependent and independent variablesElectronic mailing listNuclear spaceTwitterSummierbarkeitCausalityLecture/Conference
21:47
Direction (geometry)Point (geometry)MathematicsHypermediaImplementationProper mapPhase transitionLevel (video gaming)Information systemsIntercept theoremDecision theoryVotingWeb 2.0State of matterProcess (computing)Interpreter (computing)Lecture/Conference
23:12
Representation (politics)PermanentBlogDirection (geometry)Representation (politics)Multiplication signState of matterComputer animation
24:01
XMLUML
Transcript: English(auto-generated)
00:05
Next speaker custom feelers the managing director of Idri and Idri is the Association of all Net political NGOs in Europe. So making sure this goes out to all member organizations Kirsten is going to be speaking to us today about censoring the web and how that makes us less secure
00:24
The mantle of anti-terror measures, please. Give her a warm welcome and a round of applause Good morning. I have to sort out the slides. I Think I broke the adapter
00:53
Okay. Yeah, okay
01:11
Yeah, good morning again My name is Kristen Fichler. I work for Edry in Brussels as Geraldine just said we're the umbrella organization for civil rights groups from across Europe and we defend
01:26
human rights and the digital age So today I have the pleasure of Talking to you about something rather depressing I'm afraid That is to say the most recent anti-terrorism measures how they are
01:43
Censoring the web and how they are making us less secure So this has really taken a lot of address time in the last Months and you will see why in the next 20 minutes So, I think you could talk endlessly about Anti-terrorism measures since states everywhere in Europe were super busy passing one after the other
02:07
so I will concentrate today rather on the what and the why rather than the how and give you three main ingredients and This is populism opportunism and ideology. I
02:21
Will speak only very quickly about how populism has driven the security agenda for the past 15 years Then I'll explain how the latest attacks were a brilliant opportunity to pass even more without Assessing the existing measures and lastly I'm going to explain a bit more in detail the ideology
02:42
especially the ideology behind the New anti-terrorism directive and then at the end. Well, we'll see what we can do now So how has populism driven the security agenda since 9-11? to understand this you just need to look at the wave of measures a
03:04
Study from December 2013 counted over 230 Counter-terrorism measures since 9-11 only adopted by the EU So at the EU level not counting what happened in the member states and this year's really just a tiny tiny fraction of them
03:21
So why did the EU pass so many measures? So I think it's a big question, but the part of the answer is Out of sheer populism Because after each attack after 9-11 after Madrid after London and so on every time there was a new wave of measures and Never ever were the existing ones
03:41
assessed for their efficiency and Since there's no real evidence for the efficiency the only visible impact of this these measures seem to be To demonstrate to the public that politicians are doing something And then we had the attacks in France Belgium and Denmark in 2015-2016 and
04:05
This was an incredible opportunity to pass even more surveillance measures So I was at this anti-terrorism event in the European Parliament last week Where the Belgian Minister for interior? Jan-Jan Bong
04:20
Quoted Churchill and he really said never waste a good crisis. I'm not I'm not kidding So at the EU level this was the occasion to fast-track the Surveillance of air passengers. So the passenger name record directive We had the so-called EU Internet Forum. This was an informal project where the Commission
04:44
Set together with Google Facebook and Twitter to see how these companies can censor the web on a voluntary basis Then we had the Europol regulation with catastrophic oversight and There was even the creation of a new commissioner job. So we now have Sir Julian Kenning
05:05
in charge of security and but most importantly most most importantly they pass and fast-track the anti-terrorism directive that I will explain in more detail now, so
05:21
For over 15 years now, we have observed a big populist push to adopt even more Surveillance measures with the attacks of the past years. There was an opportunity to pass even more and now instead of Evidence-based policy making we have this proposal for a new directive whose contents are purely based on ideology and
05:44
This ideology is to collect more and more data to find Short-term measures instead of finding efficient long-term solutions and It is an ideology to control and monitor and to pass More repressive measures instead of considering the social problems that are underlying
06:07
So Before diving into the nasty bits of the anti-terrorism directive. Let's do a super short excursion To remind you how the legislative process works in Brussels, so in most cases
06:21
Lawmaking starts with a public debate or an event Then the political discussions in the institution start and this can take the form of expert roundtables in the Commission hearings in the European Parliament or In most of the cases the European Commission also launches a public consultation
06:45
Then the Commission comes up with different policy options and starts writing a proposal internally choosing one of the options and Then it publishes publishes a legislative proposal together with an impact assessment and this impact assessment usually explains
07:03
Why they chose that instrument it assesses the impact and the efficiency and it assesses What impact it has also on fundamental rights? So the Commission proposes the text and then parliamentarians and also the Council of the European Union suggests
07:23
modifications Then in most cases in the final stages of lawmaking in Brussels you have a process that's called trial logs and They are called trial logs because the three institutions Start negotiating and agree then on a text and come to a decision
07:46
This is very intransparent because during trial logs, you can't get access to the negotiating documents You don't know who proposes what and sometimes there's completely new text on the table that has never been democratically approved by the Parliament and
08:03
then at the very end you have the implementation phase in the member states and Sometimes this process can take years. For example The data protection reform took more than five years The net neutrality regulation that Thomas learning. I will talk about later today took around two years
08:25
So let's have a look at the anti-terrorism directive. So we had the Paris attacks on 13th of November Followed by almost no political debates in the in the institutions There was no public consultation by the Commission and only two weeks later in
08:45
beginning of December the Commission published proposal for this directive so either the Commission wrote the text in two weeks or What I find more likely it had it already somewhere in a drawer And also there was no impact assessment
09:04
while the excuse was because of the attacks because of terrorism something needed to be adopted quickly and What this means is that nobody has analyzed if the proposal? If the measures would work first of all and nobody has checked if the measures undermine fundamental rights or not
09:25
You could also say the proposal is based on zero evidence and Apparently terrorism is taken so seriously by policymakers in the EU that beliefs seem to be sufficient and Evidence is not needed
09:43
Going back to the timeline Only three months after the publication of the proposal by the Commission the 28 member states had come to an agreement of their common position It's also sometimes called the general approach If you compare this to the data protection reform
10:01
It took the member states three and a half years to come to a general approach So this means that on top of the complete lack of evidence to support the Commission proposal The other two institutions are now adding more elements When nobody has a clue if they would work or not
10:22
so apparently No political debate is needed to identify really effective measures And then on top of this the political environment is super toxic in Brussels So this year is a press release by the conservative group in the Parliament just after the Paris attacks
10:45
and it says that terrorists would happily vote left and This was really super successful in the Parliament because it intimidated parliamentarians from the center and from the left To vote in favor of the measures or at least abstain and some social Democrats
11:06
Really do not ever wish to be in this position again and do not ever wish to be accused like this again So the result of this was there were some surprising votes in favor which meant that the proposed text was mostly
11:22
modified to the worst by the European Parliament So this means instead of a fact-based approach the directive is being pushed through very quickly and emotions prevail over evidence and arguments So what's in this directive?
11:40
The main goal is to regulate terrorist defenses, of course and The support for these activities and this includes provisions on the financing of terrorist groups travel training their radicalization and There are also quite a few words on what to do in the online world
12:03
So what's on the table with regard to cyber cyber? The four most problematic areas are firstly vague definitions secondly blocking and censorship thirdly the weakening of encryption and the proposal to
12:22
well to intercept communications on a massive scale and attacks against information systems So For instance the text says that there is a growing misuse of the internet and This is simply assumed. No figures are presented why they think that this is the case
12:45
Then what the hell is indirect provocation? I don't know What is the radicalization of citizens it again This is nowhere explained or defined and then lastly what is meant by by
13:01
glorification and justification of terrorism again, there is no definition and The fact that this is not defined is definitely going to have a nasty impact on freedom of expression Because this is already the case in France where similar laws are in place In France the undefined glorification is in law
13:23
and this has recently led to the prosecution of a 16 year old who published an ironic drawing on Facebook and He clearly didn't fit the terrorist profile at all and still he was taken into custody and
13:41
Only recently a homeless guy was condemned to nine months prison and what he did was He was taken into hospital for alcohol poisoning while he was clearly super drunk and then he started shouting around crazy stuff about going back to Syria and he got nine months prison for this and this is not the only case of
14:00
Where a homeless guy or person ended up in prison for for a glorification of terrorism? and Even an eight-year-old was arrested by police on the basis of glorification and justification Where nobody knows what this includes or not and clearly the kid didn't know what he was saying
14:25
So policymakers don't even try to write a legislative text that makes sense There are contradictions everywhere in the anti-terrorism directive and a countless number of words are open to interpretation
14:40
So the second problem is the addition of web blocking The European Parliament rapporteur miss who am I from the CSU introduced this in recital 7 and 14 and Firstly it states that the suggested measures of the directive should be without prejudice to voluntary action
15:01
by internet industry so this Sort of wording we have already seen it in actor and it means that Member states can encourage service provider providers to arbitrarily censor and monitor the networks, so basically states hand over the responsibility to private actors
15:23
Facebook Google Twitter and co Put in the position of police judge and jury over our freedom of expression online And according to a number of expert bodies from the OCE to the Council of Europe This is clearly in breach of article 10 of the European Convention on Human Rights
15:45
And then it states that member states should take all necessary measures to remove or block access to web pages So you have to note that the text doesn't say they may do so. So this is more towards an obligation
16:02
to introduce web blocking and Nobody ever explained why it should be necessary to do so. So this is again a purely ideological Addition it lacks any kind of evidence That this measure might actually work because we all know the problem with internet blocking is that you can have lots of
16:26
Collateral damage because legitimate speech is taken down Then throughout the entire text there's no mention of a court order which is highly problematic from the rule of law point of view and
16:40
Then lastly, of course, the content will remain there. It will remain available and it's no It doesn't take a lot of knowledge to circumvent blocking so The Suggested text even goes against the Commission's own evidence
17:01
Because in at least two papers the Commission itself called web blocking inefficient But the Commission doesn't seem to care that council and Parliament are adding that sort of text to the directive Instead it's very likely that we'll soon get more online censorship across Europe and random restrictive actions
17:21
by companies on this basis So the third part is super worrying And it's on encryption and interception of communications and here the text also remains super vague And I think the fact that it's vague is probably not a bug but it's a feature
17:41
Because member states can then implement the text as they wish on the national level in any case So the text by the Parliament suggests that member states need to ensure the easy collection of Undefined electronic evidence and it's not explained at all what this means There's no definition to be found in the entire text
18:02
But you get the feeling that this text is trying to make sure that law enforcement will be able to get access to communications by any means that they wish and One way to do this is by pushing for encryption back doors Sure electronic evidence can mean anything
18:22
But if you put this in the context of other proposals that were on the table in the Parliament Then it becomes pretty clear here the conservative Parliamentarian in charge miss or Maya also pointed out that anonymous communication tools like Tor are a problem for law enforcement
18:41
this part Didn't get through the liebe vote though It also becomes clear what it means if you look at the recent German French initiative and it becomes clear that the intention is Has something to do with encryption if you look at this
19:01
Questionnaire that the council presidency has just distributed to the member states So this means that in the name of security Governments are actively working on making their citizens less secure But there's also good news about encryption back doors, and that's that the resistance in Brussels has become pretty big
19:26
also from other sectors like industry But the bad news is that they seem to move to alternatives. So They want to allow the use of straight state Trojans and they want to allow the book interception of communications
19:42
So here the text suggests that law enforcement should have the possibility to use effective investigative tools and again, this is kept very broad to allow the member states to do what they want and Then it goes on to say that law enforcement should include the interception of communications
20:01
Electronic surveillance and the taking of audio and audio recordings and visual images So this is again not very detailed and leaves the lower open to very very extensive surveillance measures So since the ideology is to collect more and more data, there's no need to care about the right to privacy
20:23
No need to care about the principles that are the foundation of our democracies The last problematic part of the directive is attacks against information systems and article 3 here of the proposed directive lists all of the different offenses and this includes of course
20:45
Attacks that cause death or injury to people the use of nuclear or biological weapons and so on But the Parliament reporter miss who am I also added attacks against information systems and this means that Interfering or even just accessing without prior authorization of an information system can be considered a terrorist offense
21:09
So any sort of security research also becomes punishable? And well threatening to do so also becomes punishable So if I say tonight on Twitter, I am going to test the security of company X
21:24
Then I will have committed a crime under this directive So the text makes unauthorized access to information systems a terrorist offense and even if it is to test the security of a company or for research reasons and this then of course also
21:43
penalizes the responsible disclosure of vulnerabilities So in some the council added surveillance and interception the Parliament added web locking and attacks against information systems and
22:00
Yes, where are we now? So Unfortunately, we're super late in the process now because this thing has been rushed through very quickly the third try log discussions have just taken place on 28th of September and we're getting closer and closer to a decision so
22:22
It is possible that we are going to have a plenary vote in the Parliament in December But this is only going to be a rubber stamping at that point And it's almost impossible to get any changes through now and once the directive is adopted Member states will need to pass legislation to implement the directive within two years
22:46
So the huge problem that we have is that the directive is being pushed super quickly Too quickly to get proper attention of media and it's possible that the press will only wake up once this thing has been Adopted and as I said, it's open to interpretation. So we'll get lots of fun during the implementation phase at the national level
23:08
Especially with web blocking But there's still some things that can be done Firstly you can block and tweet about it. You can phone mrs. Holm ia
23:21
since she is still negotiating in the try locks and Then maybe more fruitful you could contact all S&D people all the social Democrats in the Parliament Especially from Germany and tell them I will not vote for you in the Bundestag swine if you are adopting this directive
23:41
Or you can also contact the representation of your member states in Brussels and your ministry Yes, I think I ran over time Sorry, that's all I hope I haven't depressed you too much. But yeah, I guess we can talk about this later if you want