Directive Terrorisme/en : Différence entre versions

De La Quadrature du Net
Aller à la navigationAller à la recherche
(Page créée avec « Amendment 6 modifying recital 7 and amendment 40 introducing a new article 14bis on "webpages publicly inciting to committing terrorist offences", in order to "remove" or... »)
 
(41 révisions intermédiaires par 4 utilisateurs non affichées)
Ligne 1 : Ligne 1 :
{{Travail En Cours}}
 
 
 
<languages />
 
<languages />
  
Ligne 15 : Ligne 13 :
  
 
This draft Directive will be discussed in the LIBE commission of the European Parliament on 3 May 2016 and will then go to plenary<ref>The vote in plenary could take place during the month of June 2016</ref>.
 
This draft Directive will be discussed in the LIBE commission of the European Parliament on 3 May 2016 and will then go to plenary<ref>The vote in plenary could take place during the month of June 2016</ref>.
 +
 +
<big><center>'''[[Directive Terrorisme/Amendements LIBE/en|Follow changes on compromise amendments in LIBE Committee]]'''</center></big>
  
 
=Hohlmeier Report=
 
=Hohlmeier Report=
 
On 9 March, the rapporteur, Monika Hohlmeier (EPP<ref> European People's Party that notably includes the French "Les Républicains" party</ref>, Germany) presented her [http://www.europarl.europa.eu/sides/getDoc.do?type=COMPARL&mode=XML&language=EN&reference=PE577.046 report] including numerous amendments, some of which are very plainly geared towards Internet censorship.
 
On 9 March, the rapporteur, Monika Hohlmeier (EPP<ref> European People's Party that notably includes the French "Les Républicains" party</ref>, Germany) presented her [http://www.europarl.europa.eu/sides/getDoc.do?type=COMPARL&mode=XML&language=EN&reference=PE577.046 report] including numerous amendments, some of which are very plainly geared towards Internet censorship.
 +
 +
==Aiding and abetting: need to take into account the notion of intention==
 +
The [http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52015PC0625&from=EN original text] of the directive included an article 16 too broad as it allowed considering in the scope of infractions any particular assistance, without defining the terms "aiding" and "abetting". Article 16, paragraph 1, was drafted as follows: "''Each  Member  State  shall  take  the  necessary  measures  to  ensure  that  aiding  or abetting an offence referred to in Articles 3 to 8 and 11 to 14 is made punishable.''"  Recital 11<ref>Recital 11 was initially draft as follows:"''Furthermore, the provision of material support for terrorism through persons engaging in or acting as intermediaries in the supply or movement of services, assets and goods, including trade transactions involving the entry into or exit from the Union should be punishable  in  the  Member  States,  as  aiding  and  abetting  terrorism  or  as  terrorism financing  if  performed  with  the  knowledge  that  these  operations  or  the  proceeds thereof are intended to be used, in full or in part, for terrorist purposes or will benefit terrorist groups''"</ref> proposed a very broad interpretation of the assistance provided or complicity, as it was enough to know that an operation would be used ''in whole or in part, for terrorism''" to be punishable.
 +
 +
Here, the notion of intention is fundamental. Indeed, many tools are available for all, knowing that these tools may and can be used by people preparing and committing crimes. For example, car manufacturers know that cars are very useful to prepare or commit an offense (travel, flee, etc.). Similarly, many tools on the Internet, (email boxes, anonymization tools, encryption, etc.) are likely to be used for terrorism (or other crimes). However, neither the car manufacturers or developers of electronic tools intend to help the commission of offense. So this is the will and intention of aiding and abetting committing an offense that should be punishable and not only the knowledge.
 +
 +
But the compromise amendments - which are everything but compromises -  tabled by Monika Hohlmeier take back those of the Commission in the recital 11<ref>In the 27 May version of the compromise amendments, the recital had this wording: "(11) The provision of material support for terrorism through persons engaging in or acting as intermediaries in the supply or movement of services, assets and goods, including trade transactions involving the entry into or exit from the Union, should be punishable in the Member States as aiding and abetting terrorism or as terrorism financing if performed with the clear knowledge that these operations or the proceeds thereof are intended to be used, in full or in part, for terrorist purposes or will benefit terrorist groups."</ref> and the article 16<ref>In the 27 May version of the compromise amendments, the title of the article 16 had this wording: "Article 16: Aiding or abetting, inciting and attempting" and the 1st paragraph: "Each Member State shall take the necessary measures to ensure that aiding or abetting an offence referred to in Articles 3 to 8 and 11 to 14 is made punishable."</ref>, eliminating all notion of intention and leaving a very large leeway for Member States for the interpretation of those notions of aiding and abetting.
  
 
== Net censorship and blocking websites ==
 
== Net censorship and blocking websites ==
Ligne 24 : Ligne 31 :
 
Amendment 6 modifying recital 7 and amendment 40 introducing a new article 14bis on "webpages publicly inciting to committing terrorist offences", in order to "remove" or "block access" to "webpages publicly inciting to committing terrorist offences" [Amendment 6]. However, these amendments leave a large leeway for Member States to enforce any measures that they will seem appropriate, as long as the procedures are " transparent procedures and provide adequate safeguards, in particular to ensure that the restriction is limited to what is necessary and proportionate" [Amendments 6 and 40].  
 
Amendment 6 modifying recital 7 and amendment 40 introducing a new article 14bis on "webpages publicly inciting to committing terrorist offences", in order to "remove" or "block access" to "webpages publicly inciting to committing terrorist offences" [Amendment 6]. However, these amendments leave a large leeway for Member States to enforce any measures that they will seem appropriate, as long as the procedures are " transparent procedures and provide adequate safeguards, in particular to ensure that the restriction is limited to what is necessary and proportionate" [Amendments 6 and 40].  
  
Les garanties que semble vouloir apporter Monika Hohlmeier ne permettent cependant pas d'interdire une extra-judiciarisation de la répression des contenus en ligne. Ces dispositions poussées par la rapporteure allemande semblent taillées pour la France qui obtiendrait ainsi la validation par l'Union européenne des mesures de censure qu'elle a mises en place et notamment :
+
Monika Hohlmeier's safeguards do not protect against extra-judiciary repression of online content. The provisions advocated for by the German rapporteur seem tailored to fit the censorship measures that France has put in place, as to validate them at the European level, and specifically:
* d'une part la possibilité d'imposer aux services en ligne, tels que les réseaux sociaux et autres hébergeurs, une obligation de surveillance des communications de leurs utilisateurs en vue de censurer ces contenus ;
+
* one the one hand, the ability to require that online services (such as social networks and other hosts) monitor their users' communications in order to censor content;
* d'autre part, la possibilité pour les gouvernements d'exiger des fournisseurs d'accès Internet le blocage des sites diffusant de tels contenus.
+
* on the other hand, the ability for governments to require that ISPs block the websites on which such content would be published.
 +
 
 +
This measure would allow for extending private censorship and to trivialise administrative censorship, as France has done, by bypassing judicial control under the guise of avoiding the purported impediments of judiciary red-tape. However, considering the difficulty of judging what falls within glorification or apology of terrorism, the delegation of judiciary functions to private or administrative actors goes against the protection of fundamental rights.
 +
 
 +
Website blocking - tabled without the slightest impact study - shows itself to be a disproportionate freedom-limiting measure on communication. Considering that the blocking are very easily bypassed, these measures are no long-term solution against glorification and apology of terrorism. A number of technical means can be used to make distribution and diffusion of websites possible, notwithstanding that the actual impact on incitations to terrorism remains uncertain. A well-known method consists in setting up an encrypted tunnel, the so-called "proxy", that is a piece of software placed between a client and a server that allow two host computers to communicate with each other without transmissions ever reaching the actual server and being traceable. Furthermore, the inevitable risk of blocking perfectly legitimate content makes website blocking even more disproportionate.
 +
 
 +
Furthermore, experience from France shows the limits of this system. The person in charge authorised by CNIL to control blocking measures has published his activity report in April 2016.
 +
* Article 6-1 of LCEN provides for content hosts and editors to be notified of the removal notice beforehand, with a 24-hour margin to remove the litigious content. However, the person in charge clearly indicates that this measure is bypassed without justification under the  pretext that "in practice, editors and hosts are almost never identified". This constitutes a breach of law that attacks the rights of content hosts and editors who might have been notified but were not, without justification.
 +
* The person in charge insists on the utmost difficulty to judge whether content "making an apology of terrorist actions or inciting to such actions" are illegal or not, which considerably reinforces the absolute need to recommand a judiciary process.
 +
* The number of requests for blocking website with terrorist content amounted to 68 for 2015, which is a very low number
 +
* The State of Emergency law, modified by the law of 20 November 2015, allows the Interior Minister to take "any measures to ensure interruption of any online public communication service that incites to committing terrorist actions or makes apologies of these" during the state of emergency. However, at the publication of the report, the Minister of the Interior had never used this disposition.
 +
 
 +
On the other hand, the French example provides interesting insights on the blatant lack of transparency of the blocking procedure. The law only provides for the block as such. However, the French government has set up a redirection of requests for blocked pages towards a webpage hosted by the Ministry of the Interior, explaining the reasons for the block. As the Exégètes Amateurs state in their appeal to the Council of State against that measure, this "automated redirection of Internet users to a Ministry of the Interior webpage constitutes an infringement on freedom of communication and on secrecy of correspondence that is not provided for in the law, as well as a violation of the dispositions of the law of 6 January 1978 on Computing, files and liberties." Thus, the lack of a judiciary process to guarantee transparency and respect of fundamental liberties has allowed the Government to set up an opaque procedure that infringes on liberties.
 +
* The lack of transparency is blatant, as
 +
** neither the author, host or reader of the web page know what the charges are, what content is considered litigious on the blocked website, and none has any means to know the motivations for the block or the advancement of the procedure that led the administration to blocking the website
 +
** the list of blocked addresses is kept a secret and neither Internet users nor the persons directly concerned by the block are informed
 +
** the blocking procedure and the motives that may lead to blocking a website are nowhere specified.
 +
* The Government is setting up illegal processing of personal data among the data transmitted to it through the redirection, we find IP address <ref>Should the IP address considered as personal data? This question has never been resolved and was referred to the Court of Justice of the European Union in the context of the [http://curia.europa.eu/juris/document/document.jsf?text=&docid=178241&pageIndex=0&doclang=FR&mode=req&dir=&occ=first&part=1&cid=810242 C-582/14 Breyer c. Bundesrepublik Deutschland case]. The Advocate General concluded that the IP address is personal data, "''to the extent that an ISP has additional information which, combined with the dynamic IP address, allows to identify the user''". The Court will have to decide soon on this case.</ref>, information about the web browser used (including the browser version and the operating system), the list of features and activated "add-ons", authentication cookies or session, etc. <ref>For more information, read the [https://exegetes.eu.org/recours/filtragecazeneuve/CEtat/2015-10-24-replique.pdf reply] sent to the French Council of State by Exegetes Amateurs in the appeal against the administrative blocking of websites.</ref>
 +
 
 +
Considering the whole of these remarks, the amendments appear as an unacceptable attack against freedom of expression and freedom of information as laid down in Article 11 of the Charter of Fundamental Rights of the European Union. They should at least be amended to put back a judicial judge back into the core of the process, in order to stop any censorship through private or administrative means.
 +
 
 +
::''''On private censorship'''':
 +
:: Private censorship - i.e. carried out by private actors, based on agreements with governments - isn't directly in the directive on terrorism. Although, the compromise amendment 2 (article 21a) calls for a better cooperation with companies in particular to counter terrorist propaganda <ref>Text of the amendment: "Member States shall take appropriate action, including through the Internet, such as the provision of information, education and awareness-raising campaigns and the development of alternative narratives to counter terrorist propaganda, where appropriate in cooperation with private companies, relevant civil society organizations, local communities and other stakeholders, aimed at raising awareness and reducing the risk of radicalization and recruitment by terrorist organizations."</ref>. Moreover, the compromise amendment 6 (recital 7a) on removing content and site blocking lists "voluntary action taken by the Internet industry to prevent the misuse of its services or to any support for such action by Member States (...)".
 +
 
 +
::But the recent news from the European Ombudsman shows the limits of that types of measures. The European Commission has set up on 3 December 2015 the [http://europa.eu/rapid/press-release_IP-15-6243_fr.htm forum of the Internet] bringing together governments, EUROPOL and companies in the sector of Internet to fight against terrorist content and online hate speech. But the lack of full transparency in this forum and the exclusion of any actor of civil society and defending the fundamental rights to freedom of expression or information, denounced [https://edri.org/commission- under-investigation-had-internet-forum / notably by EDRI], led the Ombudsman to open a [http://www.ombudsman.europa.eu/cases/correspondence.faces/en/67709/html.bookmark investigation formal] against the European Commission.
 +
 
 +
::Between private censorship encouraged by the European Commission through the EU Internet Forum and administrative censorship in the directive, the protection of freedom of expression seems to become an option gradually neglected. The European Parliament seems to unfortunately follow the path of France where two years ago chose to fight against terrorism by weakening the fundamental rights and freedoms.
 +
 
 +
:: Nevertheless it is important to mention the conclusions of the [https://www.coe.int/fr/web/freedom-expression/study-filtering-blocking-and-take-down-of-illegal-content-on-the-internet comparative study on blocking, filtering and removal of illegal content on the Internet] conducted by the Swiss Institute of Comparative Law at the request of the Secretary General of the Council of Europe. Part [https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=09000016806554c4 on France] states that "'' the compatibility of administrative blocking of websites inciting to terrorist offences or glorifying terrorism, with the emerging jurisprudence of the European Court of Human Rights does not exist yet''. Indeed, "''if the possibility of restricting freedom of expression without the prior intervention of a judge seems certain to the Constitutional Court for websites that "disseminate child- pornography content", it remains that this blockage on administrative is based on a objective observation: the presence of images of pornography involving children. The qualification of the notions of inciting to terrorism however, can be much more difficult in that it is a much more subjective topic.''"
 +
 
 +
==Search of electronic evidences==
 +
The question of electronic evidences is vague in the report made by the Rapporteur Monika Hohlmeier, mostly through the amendments 19 and 20 (creating recitals 15 sexties and 15 septies). It is about coordination of States, through Eurojust especially, by "the collecting, sharing and admissibility of electronic evidences". But the amendment 20 point clearly the "anonymizers, proxy servers, Tor network [...]" and storage in remote servers ("in the cloud"). The amendment specifies that Member States "should therefore cooperate among each other notably through Eurojust and Europol and with the European Commission to ensure a coordinated approach in this field to improve the efficiency of dealing with the gathering, sharing, and admissibility of electronic evidence".
 +
 
 +
Between the lines, the will of the rapporteur and states like France that support this measure is twofold: to address the issue of encryption and to increase dramatically the means of police investigation.
 +
 
 +
===Encryption===
 +
Encryption tools and the development of technology under the concept of "privacy by design" are tools that allow individuals and companies to protect their communications.
 +
It is about the appropriation by individuals of the "right to privacy" and the "right to the secrecy of correspondences". These rights have a particular meaning considering the mass surveillance carried out by some States and the collection and processing of personal data by private companies.
 +
It is also used by companies to secure their activities, communications and transactions.
 +
Weakening encryption and "privacy by design" technologies by imposing device and software manufacturers to voluntarily introduce flaws (or "backdoors"), carries an unnecessary and disproportionate infringement of the right to privacy, breaks the confidence of users in the software and the hardware, and reduces firms' innovation capabilities.
 +
 
 +
Many actors, from [http://www.lesechos.fr/01/03/2015/lesechos.fr/0204190139261_michel-combes-----le-patriotisme-economique-n-est-pas-un-gros-mot--.htm Telecoms], government, police, <ref> See [http://www.lemonde.fr/pixels/article/2016/02/19/chiffrement-et-terrorisme-les-enjeux-du-conflit-apple-fbi-touchent-la-police-francaise_4868385_4408996.html Le Monde (fr)] and [http://www.zdnet.fr/actualites/chiffrement-le-debat-s-envenime-suite-aux-attentats-parisiens-39828412.htm ZDNet (fr)] </ref> or from [http://www.lemonde.fr/pixels/article/2015/08/11/chiffrement-des-telephones-le-procureur-de-paris-rejoint-la-lutte-contre-apple-et-google_4721095_4408996.html legal community] in Europe and the US in particular, have come out in favour of the possibility that public authorities  to access information, even when encrypted.
 +
 
 +
But granting public authorities access to devices and encrypted data creates security problems, significantly weakening the encryption system. Cryptology specialists are extremely opposed to the creation of backdoors in encryption systems. Very recently, in a [https://www.contexte.com/documents/7844/declaration-commune-enisaeuropol.html joint declaration], the [https://www.enisa.europa.eu/ ENISA] <ref> European Union Agency for Network & Information Security (ENISA) </ref> [https://www.europol.europa.eu/content/page/about-us Europol] <ref> European Union's law enforcement agency </ref> clearly stance against backdoors that will weaken intrinsically protections for all users against criminals.
  
Cette mesure permettrait, à l'instar de la France, d'étendre la censure privée et banaliser la censure administrative, en contournant le contrôle judiciaire au prétexte d'éviter la supposée lenteur des procédures judiciaires. Or, compte tenu de la difficulté de juger de ce qui relève ou non de la glorification ou de l'apologie du terrorisme, la délégation des fonctions judiciaires à des acteurs privés ou administratifs va à l'encontre de la protection des droits fondamentaux.
+
The trend of some States is to bypass the issue of encryption by legislative means. In France, the Criminal Code, the Criminal Procedure Code and the Internal Security Code allow:
 +
* to [https://www.legifrance.gouv.fr/affichCodeArticle.do;jsessionid=04DF7D11D043AC512BCC01162358C0A9.tpdila17v_2?idArticle=LEGIARTI000006417506&cidTexte=LEGITEXT000006070719&dateTexte=20160408 drastically increase the sentences] for violations committed using an encryption tool [Article 132-79 of the Penal Code],
 +
* the police to [https://www.legifrance.gouv.fr/affichCodeArticle.do;jsessionid=E4BB800F88C1BED38D3671DCDDB8AC66.tpdila17v_2?idArticle=LEGIARTI000029759857&cidTexte=LEGITEXT000006071154&dateTexte=20160523 request] from any person ''"having knowledge of measures applied to protect data"'' informations granting the access to the data [Art. 57-1 Code of Penal Procedure],
 +
* to [https://www.legifrance.gouv.fr/affichCode.do;jsessionid=262E8D67622A3F88D894B461AE3EEE97.tpdila18v_3?idSectionTA=LEGISCTA000023712010&cidTexte=LEGITEXT000006071154&dateTexte=20160523 designate during an investigation or instruction] "''any legal person qualified to perform the technical operations to obtain the access to this information, the version in clear and, where a mean of encryption was used, the secret decryption agreement if necessary </em> "[Article 230-1 of the criminal procedure code],
 +
* to [https://www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000006070719&idArticle=LEGIARTI000006418646&dateTexte=&categorieLien=cid punish] of three years of imprisonment and of a 45,000 euro fine the refusal to hand over to the judicial authorities of a secret encryption agreement that would have been used to prepare, facilitate or commit a crime or an offence [Article 434-15- 2 of the criminal code]. This penalty is increased to 270 000 in the [http://www.assemblee-nationale.fr/14/dossiers/lutte_crime_organise_terrorisme.asp bill against organized crime and terrorism] currently in discussion,
 +
* to [https://www.legifrance.gouv.fr/affichCodeArticle.do;jsessionid=2628FBAE857D033830D8DA0F9088F55C.tpdila18v_3?idArticle=LEGIARTI000030937647&cidTexte=LEGITEXT000025503132&dateTexte=20160523 require from cryptology manufacturers] to hand in "''within seventy-two hours''" decryption keys [Article L871-1 of the Code of Interior Security],
 +
* through the article 4 paragraph 6 of [http://www.assemblee-nationale.fr/14/dossiers/lutte_crime_organise_terrorisme.asp the bill against organized crime and terrorism], allows sealed to be open for "''clearing up operations''".
  
Le blocage de sites Internet - proposé sans aucune étude d'impact - apparaît comme une mesure restreignant la liberté de communication de manière disproportionnée. Compte tenu du fait que le blocage de sites peut très facilement être contourné, ce type de mesures n'apporte pas de solution pérenne à la lutte contre la glorification et l'apologie du terrorisme. Plusieurs moyens techniques peuvent en effet être déployés pour rendre possible la distribution et la diffusion de ces sites, abstraction faite de l’impact plus au moins réel qu’ils ont sur la provocation aux actes terroristes. Une méthode bien connue consiste à mettre en place un tunnel chiffré, dit proxy, c'est-à-dire un logiciel qui s’interpose entre un client et un serveur permettant la communication entre deux ordinateurs hôtes, sans que la communication n’arrive jamais au serveur et puisse être repérée. Le caractère disproportionné du blocage de site tient en outre à l'inévitable risque de sur-blocage de contenus parfaitement licites.
+
This legislative framework is in many ways at odds with the '' [https://wiki.laquadrature.net/Analyse_PJL_crime_organis%C3%A9#Atteinte_au_droit_de_se_taire right to remain silent]'' and '' right to the presumption of innocence'' (and therefore not to incriminate oneself), thus infringing the rights protected by Articles 6 (right to security) and 48 (presumption of innocence and respect for the rights of defence) of the [http : //www.europarl.europa.eu/charter/pdf/text_fr.pdf Charter of fundamental rights]. It would therefore be particularly dangerous to extend the powers of the administrative and judicial authorities in France and transpose them in other countries. The technical and legislative means used to access the encrypted data and devices must not reduce the scope of fundamental rights, nor jeopardize the freedom to use encryption tools,to protect the privacy and confidentiality of communications for instance.
  
En outre, l'expérience française montre les limites de ce système. La personnalité qualifiée nommée par la CNIL pour contrôler les mesures de blocage a publié son [https://www.cnil.fr/fr/controle-du-blocage-administratif-des-sites-1er-rapport-de-la-personnalite-qualifiee premier rapport d'activité] en avril 2016.
+
=== Police investigative powers ===
* L'article 6-1 de la LCEN prévoit que les hébergeurs et éditeurs doivent préalablement être notifiés de la demande de retrait de contenu, avec un délai de 24h pour retirer le contenu litigieux. Or la personnalité qualifiée indique clairement que cette mesure est contournée sans justification systématique au prétexte que « dans la pratique, les éditeurs et hébergeurs ne sont presque jamais identifiés ». Il s'agit donc d'une entorse à la loi qui porte atteinte aux droits des hébergeurs et éditeurs qui auraient pu être notifiés mais ne l'auraient pas été sans justification.
+
The search for electronic evidence may also go through a sharp increase in police investigation methods with extremely broad powers, notably by extending remote access to computers without any warning to those affected. This can include both interception of communications, but especially actual remote search of specified computers.
* La personnalité qualifiée insiste sur la plus grande difficulté à juger de l'illégalité de propos « faisant l'apologie d'actes de terrorisme ou provoquant à de tels actes », ce qui renforce considérablement la nécessité absolue de préconiser une procédure judiciaire.
 
* Le nombre de demandes de blocage de sites à caractère terroriste est de 68 pour l'année 2015, c'est-à-dire très faible.
 
* La loi sur l'état d'urgence modifiée par la loi du 20 novembre 2015 permet au ministre de l'intérieur de prendre « toute mesure pour assurer l’interruption de tout service de communication au public en ligne provoquant à la commission d’actes de terrorisme ou en faisant l’apologie » pendant l'état d'urgence. Or au moment de la publication du rapport, le ministre de l'intérieur n'avait jamais eu recours à ce dispositif.
 
  
D'autre part, l'exemple français est intéressant sur le manque flagrant de transparence sur la procédure de blocage. La loi ne prévoit que le blocage ''stricto sensu''. Or le Gouvernement français a mis en place une redirection des requêtes vers les pages bloquées vers une page hébergée par le ministère de l'intérieur, expliquant les raisons du blocage. Or, comme le soulignent les «&nbsp;[https://exegetes.eu.org/about/ Exégètes amateurs]&nbsp;» dans leur [https://exegetes.eu.org/recours/filtragecazeneuve/CEtat/2015-10-24-replique.pdf recours au Conseil d'État] contre cette mesure, cette «&nbsp;''redirection automatique des internautes vers une page du ministère de l’intérieur constitue une atteinte à la liberté de communication et au secret des correspondances non prévue par la loi ainsi qu’une violation des dispositions de la loi du 6 janvier 1978 relative à l’informatique, aux fichiers et aux libertés''.&nbsp;» Ainsi, l'absence de procédure judiciaire pour garantir la transparence et le respect des libertés fondamentales a permis au Gouvernement de mettre en place une procédure opaque et non respectueuse des libertés :
+
While search systems are relatively framed and need to have, in France for example, the person's authorization - or in investigations of flagrante delicto his (or her) presence or the presence of witnesses, the remote searches are totally disproportionate and do not allow the preservation the fundamental rights protected by the [http://www.europarl.europa.eu/charter/pdf/text_en.pdf Charter of fundamental rights of the European Union]: right to respect for private and family life (Article 7), right to security (article 6), freedom of expression and information (Article 11), right to an effective judicial redress (Article 47) and defence (Article 48).
* L'absence de transparence est flagrante, dans la mesure où&nbsp;:
 
** ni l’auteur du site, ni son hébergeur, ni le lecteur de la page d’information ne savent ce qui est reproché à quel contenu relevant du site bloqué et ne peuvent en aucune manière connaître ni les motifs du blocage ou l’état de la procédure conduisant l’administration vers sa décision de blocage&nbsp;;
 
** la liste des adresses bloquées est tenue secrète et ni les internautes ni les personnes directement concernée par le blocage ne sont informées&nbsp;;
 
** la procédure de blocage et les motivations pouvant conduire au blocage d'un site ne sont indiquées nulle part.
 
* Le Gouvernement met en place de façon illégale un traitement des données personnelles puisque parmi les données qui lui sont transmises via la redirection, on trouve notamment l'adresse IP<ref>L'adresse IP peut et doit-elle être considérée comme une donnée à caractère personnel ? Cette question n'a jamais encore été tranchée et a été posée à la Cour de justice de l'Union européenne dans le cadre de l'affaire [http://curia.europa.eu/juris/document/document.jsf?text=&docid=178241&pageIndex=0&doclang=FR&mode=req&dir=&occ=first&part=1&cid=810242 C-582/14 Breyer c. Bundesrepublik Deutschland]. L'avocat général a conclu que l'adresse IP est une donnée à caractère personnel, «&nbsp;''dans la mesure où un fournisseur d’accès au réseau possède des informations supplémentaires qui, combinées à l’adresse IP dynamique, permettraient d’identifier l’utilisateur&nbsp'';». La Cour devra se prononcer bientôt.</ref>, des informations concernant le navigateur web utilisé (et notamment la version du navigateur et celle du système d'exploitation), la liste des fonctionnalités et «&nbsp;plugins&nbsp;» activés, les cookies d'authentification ou de session, etc.<ref>Pour plus d'informations, lire le [https://exegetes.eu.org/recours/filtragecazeneuve/CEtat/2015-10-24-replique.pdf mémoire en réplique] envoyé au Conseil d'État par Exégètes amateurs dans le cadre du recours contre le blocage administratif de sites.</ref>
 
  
Compte tenu de l'ensemble de ces remarques, ces amendements apparaissent comme une remise en cause inacceptable de la liberté d'expression et d'information consacrée à l'article 11 de la Charte des droits fondamentaux de l'Union européenne. Au minimum, il doit être amendé pour replacer le juge judiciaire au cœur du dispositif et barrer la route à la censure privée ou administrative.
+
== Corporate criminal responsibility ==
 +
In November 2015, the European Parliament voted a report presented by Rachida Dati on the [http://www.europarl.europa.eu/oeil/popups/ficheprocedure.do?reference=2015/2063%28INI%29&l=EN prevention of radicalization and recruitment of EU citizens by terrorist organizations]. The report places particular emphasis on the responsibility of corporations "'' active in the field of the Internet and social networks and Internet service providers ''" in the fight against terrorism.
  
==Recherche de preuves électroniques==
+
But the report recommends to encourage Member States to "'' consider instituting legal action, including criminal prosecutions, against companies active in the field of Internet and social networks and suppliers of Internet services who refuse to comply with an administrative or judicial request to delete illegal content or content glorifying terrorism on their online platforms ''". According to the report, "'' refusal to cooperate or lack of deliberate cooperation by these online platforms on which such illegal content can therefore move freely, should be viewed as an act of complicity can be considered as a criminal intent or negligence, and [...] it is appropriate in this case, that those responsible are brought to justice ''"[[http://www.europarl.europa.eu/sides/getDoc.do?type=TA&language=EN&reference=P8-TA-2015-0410 Paragraph 16]].
La question des preuves électroniques est amenée de façon relativement vague dans le rapport par la rapporteure Monika Hohlmeier, via notamment les amendements 19 et 20, créant les considérants 15 sexties et 15 septies. Il s'agit de faciliter la coordination des État, via Eurojust notamment, dans «&nbsp;le rassemblement, le partage et la recevabilité des preuves électronique&nbsp;». Or l'amendement 20 vise très clairement les «&nbsp;anonymiseurs, serveurs proxy, réseau Tor, liaisons par satellite et réseaux 3G étrangers&nbsp;», ainsi que le stockage sur des serveurs distants («&nbsp;dans le nuage&nbsp;»).
 
L'amendement précise que les États membres «&nbsp;devraient donc coopérer entre eux, notamment dans le cadre d'Eurojust, afin de déceler et d'éliminer les éventuels obstacles concernant les preuves électroniques dans les demandes d'entraide judiciaire.&nbsp;»
 
  
Si l'on lit entre les lignes, la volonté de la rapporteure et des États comme la France qui soutiennent cette mesure est double. Il s'agit d'une part de s'attaquer au chiffrement et d'autre part d'augmenter drastiquement les moyens d'investigation de la police.
+
These provisions are dangerous and aim to make responsible platforms and hosting services of broadcasting messages glorifying terrorism, causing high risks of preventive censorship. Such provisions seriously endanger free speech of Europeans citizens.
  
===Le chiffrement===
+
The attempt to exacerbate the problem is significant: to give hosting services and platforms, most important vectors of free speech on the Internet, a quasi-judicial power, forcing them to define themselves legality of the content they host. But simply to force them to cooperate with police administrative decisions that bypass the judiciary power, to remove content considered as illegal by the police or the administration is dangerous, as it questions the principle of balance of powers, one of the pillars of our democracies. The judiciary power - including the power to censor - should not be sidelined in favour of the executive power, and should even less be extended to private companies.  
Les moyens de chiffrement et le développement des technologies selon le concept du «&nbsp;''privacy by design''&nbsp;» sont des outils qui permettent aux individus et entreprises de de protéger leurs communications.
 
Il s'agit tout d'abord de l'appropriation par les individus du droit au respect de la vie privée ainsi que du droit au secret des correspondances. Ces droits ont une résonance toute particulière face à la surveillance de masse opérée par certains États, et face à la collecte et au traitement des données personnelles par les entreprises.
 
Il s'agit aussi pour les entreprises de sécuriser leurs activités, communications et transactions.
 
Fragiliser les technologies de chiffrement et de «&nbsp;''privacy by design''&nbsp;» en imposant par exemple aux fabricants d'appareils et logiciels des failles (ou «&nbsp;portes dérobées&nbsp;», porte une atteinte non nécessaire et non proportionnée au droit à la vie privée, rompt la confiance des utilisateurs de logiciels et de matériels, et réduit les capacités d'innovation des entreprises.
 
  
===Pouvoir d'investigation de la police===
+
The compromise amendments proposed by the rapporteur Monika Hohlmeier aim to insert these provisions in the Directive on combating terrorism. Once again this directive goes in the wrong direction by strengthening the security arsenal and opening a gaping door to administrative censorship and preventive content censorship, bringing therefore serious violations to freedom of speech and the right to information.
  
==Responsabilité pénale des entreprises==
+
It is essential to put fundamental rights at the heart of the European project, to significantly strengthen the foundations of our democracies, including the balance of powers, which alone through its counter-power mechanisms can help to find the necessary balance in a rule of law.
  
==Étude d'impact==
+
== Impact assessment ==
La Commission européenne prévoit que des études d'impact [http://ec.europa.eu/smart-regulation/impact/index_fr.htm doivent être élaborées], afin d'étudier la nécessité d'une action au niveau de l'Union européenne, ainsi que les conséquences économiques, sociales et environnementales d'une telle action, lorsque les initiatives de la Commission sont susceptibles d'avoir d'importantes incidences sur le plan économique, social ou environnemental.
+
The European Commission forecasts that the impact studies [http://ec.europa.eu/smart-regulation/impact/index_en.htm must be developed], to consider the need for action at the European Union level as well as economic, social and environmental consequences of such an action, when the Commission's initiatives are likely to have important implications for economic, social or environmental regime.
  
La Commission donne même des [http://ec.europa.eu/smart-regulation/guidelines/ug_chap3_en.htm lignes directrices] pour l'élaboration des études d'impact avec notamment :  
+
The Commission even gives [http://ec.europa.eu/smart-regulation/guidelines/ug_chap3_en.htm guidelines] for the development of impact assessments including:
* une consultation publique de 12 semaines
+
* A 12-week public consultation
* une description claire de qui sera affecté par l'initiative
+
* A clear description of who will be affected by the initiative
  
Une directive pour combattre le terrorisme aura des incidences très fortes sur les droits et libertés des européens et pourtant la Commission européenne n'a pas jugé nécessaire de prendre le temps de réfléchir à l'impact d'une telle réglementation, alors que dans plusieurs pays de l'Union européenne des lois extrêmement attentatoires aux droits et libertés sont adoptées ou sont en voie d'adoption, au nom de la lutte contre le terrorisme.
+
The Directive on combating terrorism will have profound implications for the rights and freedoms of European citizens and yet the European Commission has not found it necessary to take time to reflect on the impact of such a regulation, while in several Member States, laws extremely detrimental to the rights and freedoms are adopted or are being adopted, on behalf of the fight against terrorism.
  
Il est plus qu'urgent qu'une réflexion profonde soit menées non seulement par les États membres, mais aussi par les institutions européennes sur les conséquences de l'élaboration de lois sécuritaires, avec des bilans et analyses des lois existantes, de leur nécessité, proportionnalité et de leur efficacité.  
+
We urgently need a deep reflection to be conducted not only by Member States but also by European institutions on the consequences of the development of security laws, with reviews and analyses of existing laws, their requirements, proportionality and effectiveness.
  
 
==Notes==  
 
==Notes==  
  
[[Catégorie:Surveillance]]
+
[[Catégorie:Directive Terrorisme]]

Version actuelle datée du 15 juin 2016 à 14:21

Autres langues :
English • ‎français

See the legislative folder on the website of the European Parliament.

Introduction

The directive on combatting terrorism has been tabled by the European Commission after the terrorist attacks that took place in Europe in 2014 and 2015, in particular after the Paris attacks on 13 November. This directive aims at replacing the framework decision of 13 June 2002 on fighting terrorism. However, this project does not feature much new material, except for penalisation of travels in regions were terror operations take place and apology of terrorism.

Beside definition of terrorist infractions, the project includes a number of measures, for example turning certain terrorist activities into criminal offences.

  • Apology of terrorism and "when committed intentionally, diffusion or publication in any other form of a message, with the intention to incite to committing" terrorist actions (article 5). However, this proposal is extremely blurry and the criteria of intention cannot sufficiently protect a person sharing messages considered as encouraging terrorist offences for information or liberty reasons.
  • Travels abroad for terrorism purposes, "when committed deliberately, going to another country in order to commit terrorist offences". Again, this infraction is extremely wide and blurry.

This draft Directive will be discussed in the LIBE commission of the European Parliament on 3 May 2016 and will then go to plenary[1].

Follow changes on compromise amendments in LIBE Committee

Hohlmeier Report

On 9 March, the rapporteur, Monika Hohlmeier (EPP[2], Germany) presented her report including numerous amendments, some of which are very plainly geared towards Internet censorship.

Aiding and abetting: need to take into account the notion of intention

The original text of the directive included an article 16 too broad as it allowed considering in the scope of infractions any particular assistance, without defining the terms "aiding" and "abetting". Article 16, paragraph 1, was drafted as follows: "Each Member State shall take the necessary measures to ensure that aiding or abetting an offence referred to in Articles 3 to 8 and 11 to 14 is made punishable." Recital 11[3] proposed a very broad interpretation of the assistance provided or complicity, as it was enough to know that an operation would be used in whole or in part, for terrorism" to be punishable.

Here, the notion of intention is fundamental. Indeed, many tools are available for all, knowing that these tools may and can be used by people preparing and committing crimes. For example, car manufacturers know that cars are very useful to prepare or commit an offense (travel, flee, etc.). Similarly, many tools on the Internet, (email boxes, anonymization tools, encryption, etc.) are likely to be used for terrorism (or other crimes). However, neither the car manufacturers or developers of electronic tools intend to help the commission of offense. So this is the will and intention of aiding and abetting committing an offense that should be punishable and not only the knowledge.

But the compromise amendments - which are everything but compromises - tabled by Monika Hohlmeier take back those of the Commission in the recital 11[4] and the article 16[5], eliminating all notion of intention and leaving a very large leeway for Member States for the interpretation of those notions of aiding and abetting.

Net censorship and blocking websites

Monika Hohlmeier tabled several amendments aiming at strengthening online repression and censorship, by focusing only on the use of the Internet by "fanatics worldwide" [Amendment 3] and on the difficulty to trace their online activity, thus justifying Member States cooperation in the detection and the deletion of illegal content such as those "[making] glorification and apology of terrorism, or dissemination of messages or images, including those related to victims of terrorism, used to propagate the terrorist cause". [Amendment 6]

Amendment 6 modifying recital 7 and amendment 40 introducing a new article 14bis on "webpages publicly inciting to committing terrorist offences", in order to "remove" or "block access" to "webpages publicly inciting to committing terrorist offences" [Amendment 6]. However, these amendments leave a large leeway for Member States to enforce any measures that they will seem appropriate, as long as the procedures are " transparent procedures and provide adequate safeguards, in particular to ensure that the restriction is limited to what is necessary and proportionate" [Amendments 6 and 40].

Monika Hohlmeier's safeguards do not protect against extra-judiciary repression of online content. The provisions advocated for by the German rapporteur seem tailored to fit the censorship measures that France has put in place, as to validate them at the European level, and specifically:

  • one the one hand, the ability to require that online services (such as social networks and other hosts) monitor their users' communications in order to censor content;
  • on the other hand, the ability for governments to require that ISPs block the websites on which such content would be published.

This measure would allow for extending private censorship and to trivialise administrative censorship, as France has done, by bypassing judicial control under the guise of avoiding the purported impediments of judiciary red-tape. However, considering the difficulty of judging what falls within glorification or apology of terrorism, the delegation of judiciary functions to private or administrative actors goes against the protection of fundamental rights.

Website blocking - tabled without the slightest impact study - shows itself to be a disproportionate freedom-limiting measure on communication. Considering that the blocking are very easily bypassed, these measures are no long-term solution against glorification and apology of terrorism. A number of technical means can be used to make distribution and diffusion of websites possible, notwithstanding that the actual impact on incitations to terrorism remains uncertain. A well-known method consists in setting up an encrypted tunnel, the so-called "proxy", that is a piece of software placed between a client and a server that allow two host computers to communicate with each other without transmissions ever reaching the actual server and being traceable. Furthermore, the inevitable risk of blocking perfectly legitimate content makes website blocking even more disproportionate.

Furthermore, experience from France shows the limits of this system. The person in charge authorised by CNIL to control blocking measures has published his activity report in April 2016.

  • Article 6-1 of LCEN provides for content hosts and editors to be notified of the removal notice beforehand, with a 24-hour margin to remove the litigious content. However, the person in charge clearly indicates that this measure is bypassed without justification under the pretext that "in practice, editors and hosts are almost never identified". This constitutes a breach of law that attacks the rights of content hosts and editors who might have been notified but were not, without justification.
  • The person in charge insists on the utmost difficulty to judge whether content "making an apology of terrorist actions or inciting to such actions" are illegal or not, which considerably reinforces the absolute need to recommand a judiciary process.
  • The number of requests for blocking website with terrorist content amounted to 68 for 2015, which is a very low number
  • The State of Emergency law, modified by the law of 20 November 2015, allows the Interior Minister to take "any measures to ensure interruption of any online public communication service that incites to committing terrorist actions or makes apologies of these" during the state of emergency. However, at the publication of the report, the Minister of the Interior had never used this disposition.

On the other hand, the French example provides interesting insights on the blatant lack of transparency of the blocking procedure. The law only provides for the block as such. However, the French government has set up a redirection of requests for blocked pages towards a webpage hosted by the Ministry of the Interior, explaining the reasons for the block. As the Exégètes Amateurs state in their appeal to the Council of State against that measure, this "automated redirection of Internet users to a Ministry of the Interior webpage constitutes an infringement on freedom of communication and on secrecy of correspondence that is not provided for in the law, as well as a violation of the dispositions of the law of 6 January 1978 on Computing, files and liberties." Thus, the lack of a judiciary process to guarantee transparency and respect of fundamental liberties has allowed the Government to set up an opaque procedure that infringes on liberties.

  • The lack of transparency is blatant, as
    • neither the author, host or reader of the web page know what the charges are, what content is considered litigious on the blocked website, and none has any means to know the motivations for the block or the advancement of the procedure that led the administration to blocking the website
    • the list of blocked addresses is kept a secret and neither Internet users nor the persons directly concerned by the block are informed
    • the blocking procedure and the motives that may lead to blocking a website are nowhere specified.
  • The Government is setting up illegal processing of personal data among the data transmitted to it through the redirection, we find IP address [6], information about the web browser used (including the browser version and the operating system), the list of features and activated "add-ons", authentication cookies or session, etc. [7]

Considering the whole of these remarks, the amendments appear as an unacceptable attack against freedom of expression and freedom of information as laid down in Article 11 of the Charter of Fundamental Rights of the European Union. They should at least be amended to put back a judicial judge back into the core of the process, in order to stop any censorship through private or administrative means.

'On private censorship':
Private censorship - i.e. carried out by private actors, based on agreements with governments - isn't directly in the directive on terrorism. Although, the compromise amendment 2 (article 21a) calls for a better cooperation with companies in particular to counter terrorist propaganda [8]. Moreover, the compromise amendment 6 (recital 7a) on removing content and site blocking lists "voluntary action taken by the Internet industry to prevent the misuse of its services or to any support for such action by Member States (...)".
But the recent news from the European Ombudsman shows the limits of that types of measures. The European Commission has set up on 3 December 2015 the forum of the Internet bringing together governments, EUROPOL and companies in the sector of Internet to fight against terrorist content and online hate speech. But the lack of full transparency in this forum and the exclusion of any actor of civil society and defending the fundamental rights to freedom of expression or information, denounced under-investigation-had-internet-forum / notably by EDRI, led the Ombudsman to open a investigation formal against the European Commission.
Between private censorship encouraged by the European Commission through the EU Internet Forum and administrative censorship in the directive, the protection of freedom of expression seems to become an option gradually neglected. The European Parliament seems to unfortunately follow the path of France where two years ago chose to fight against terrorism by weakening the fundamental rights and freedoms.
Nevertheless it is important to mention the conclusions of the comparative study on blocking, filtering and removal of illegal content on the Internet conducted by the Swiss Institute of Comparative Law at the request of the Secretary General of the Council of Europe. Part on France states that " the compatibility of administrative blocking of websites inciting to terrorist offences or glorifying terrorism, with the emerging jurisprudence of the European Court of Human Rights does not exist yet. Indeed, "if the possibility of restricting freedom of expression without the prior intervention of a judge seems certain to the Constitutional Court for websites that "disseminate child- pornography content", it remains that this blockage on administrative is based on a objective observation: the presence of images of pornography involving children. The qualification of the notions of inciting to terrorism however, can be much more difficult in that it is a much more subjective topic."

Search of electronic evidences

The question of electronic evidences is vague in the report made by the Rapporteur Monika Hohlmeier, mostly through the amendments 19 and 20 (creating recitals 15 sexties and 15 septies). It is about coordination of States, through Eurojust especially, by "the collecting, sharing and admissibility of electronic evidences". But the amendment 20 point clearly the "anonymizers, proxy servers, Tor network [...]" and storage in remote servers ("in the cloud"). The amendment specifies that Member States "should therefore cooperate among each other notably through Eurojust and Europol and with the European Commission to ensure a coordinated approach in this field to improve the efficiency of dealing with the gathering, sharing, and admissibility of electronic evidence".

Between the lines, the will of the rapporteur and states like France that support this measure is twofold: to address the issue of encryption and to increase dramatically the means of police investigation.

Encryption

Encryption tools and the development of technology under the concept of "privacy by design" are tools that allow individuals and companies to protect their communications. It is about the appropriation by individuals of the "right to privacy" and the "right to the secrecy of correspondences". These rights have a particular meaning considering the mass surveillance carried out by some States and the collection and processing of personal data by private companies. It is also used by companies to secure their activities, communications and transactions. Weakening encryption and "privacy by design" technologies by imposing device and software manufacturers to voluntarily introduce flaws (or "backdoors"), carries an unnecessary and disproportionate infringement of the right to privacy, breaks the confidence of users in the software and the hardware, and reduces firms' innovation capabilities.

Many actors, from Telecoms, government, police, [9] or from legal community in Europe and the US in particular, have come out in favour of the possibility that public authorities to access information, even when encrypted.

But granting public authorities access to devices and encrypted data creates security problems, significantly weakening the encryption system. Cryptology specialists are extremely opposed to the creation of backdoors in encryption systems. Very recently, in a joint declaration, the ENISA [10] Europol [11] clearly stance against backdoors that will weaken intrinsically protections for all users against criminals.

The trend of some States is to bypass the issue of encryption by legislative means. In France, the Criminal Code, the Criminal Procedure Code and the Internal Security Code allow:

  • to drastically increase the sentences for violations committed using an encryption tool [Article 132-79 of the Penal Code],
  • the police to request from any person "having knowledge of measures applied to protect data" informations granting the access to the data [Art. 57-1 Code of Penal Procedure],
  • to designate during an investigation or instruction "any legal person qualified to perform the technical operations to obtain the access to this information, the version in clear and, where a mean of encryption was used, the secret decryption agreement if necessary "[Article 230-1 of the criminal procedure code],
  • to punish of three years of imprisonment and of a 45,000 euro fine the refusal to hand over to the judicial authorities of a secret encryption agreement that would have been used to prepare, facilitate or commit a crime or an offence [Article 434-15- 2 of the criminal code]. This penalty is increased to 270 000 in the bill against organized crime and terrorism currently in discussion,
  • to require from cryptology manufacturers to hand in "within seventy-two hours" decryption keys [Article L871-1 of the Code of Interior Security],
  • through the article 4 paragraph 6 of the bill against organized crime and terrorism, allows sealed to be open for "clearing up operations".

This legislative framework is in many ways at odds with the right to remain silent and right to the presumption of innocence (and therefore not to incriminate oneself), thus infringing the rights protected by Articles 6 (right to security) and 48 (presumption of innocence and respect for the rights of defence) of the [http : //www.europarl.europa.eu/charter/pdf/text_fr.pdf Charter of fundamental rights]. It would therefore be particularly dangerous to extend the powers of the administrative and judicial authorities in France and transpose them in other countries. The technical and legislative means used to access the encrypted data and devices must not reduce the scope of fundamental rights, nor jeopardize the freedom to use encryption tools,to protect the privacy and confidentiality of communications for instance.

Police investigative powers

The search for electronic evidence may also go through a sharp increase in police investigation methods with extremely broad powers, notably by extending remote access to computers without any warning to those affected. This can include both interception of communications, but especially actual remote search of specified computers.

While search systems are relatively framed and need to have, in France for example, the person's authorization - or in investigations of flagrante delicto his (or her) presence or the presence of witnesses, the remote searches are totally disproportionate and do not allow the preservation the fundamental rights protected by the Charter of fundamental rights of the European Union: right to respect for private and family life (Article 7), right to security (article 6), freedom of expression and information (Article 11), right to an effective judicial redress (Article 47) and defence (Article 48).

Corporate criminal responsibility

In November 2015, the European Parliament voted a report presented by Rachida Dati on the prevention of radicalization and recruitment of EU citizens by terrorist organizations. The report places particular emphasis on the responsibility of corporations " active in the field of the Internet and social networks and Internet service providers " in the fight against terrorism.

But the report recommends to encourage Member States to " consider instituting legal action, including criminal prosecutions, against companies active in the field of Internet and social networks and suppliers of Internet services who refuse to comply with an administrative or judicial request to delete illegal content or content glorifying terrorism on their online platforms ". According to the report, " refusal to cooperate or lack of deliberate cooperation by these online platforms on which such illegal content can therefore move freely, should be viewed as an act of complicity can be considered as a criminal intent or negligence, and [...] it is appropriate in this case, that those responsible are brought to justice "[Paragraph 16].

These provisions are dangerous and aim to make responsible platforms and hosting services of broadcasting messages glorifying terrorism, causing high risks of preventive censorship. Such provisions seriously endanger free speech of Europeans citizens.

The attempt to exacerbate the problem is significant: to give hosting services and platforms, most important vectors of free speech on the Internet, a quasi-judicial power, forcing them to define themselves legality of the content they host. But simply to force them to cooperate with police administrative decisions that bypass the judiciary power, to remove content considered as illegal by the police or the administration is dangerous, as it questions the principle of balance of powers, one of the pillars of our democracies. The judiciary power - including the power to censor - should not be sidelined in favour of the executive power, and should even less be extended to private companies.

The compromise amendments proposed by the rapporteur Monika Hohlmeier aim to insert these provisions in the Directive on combating terrorism. Once again this directive goes in the wrong direction by strengthening the security arsenal and opening a gaping door to administrative censorship and preventive content censorship, bringing therefore serious violations to freedom of speech and the right to information.

It is essential to put fundamental rights at the heart of the European project, to significantly strengthen the foundations of our democracies, including the balance of powers, which alone through its counter-power mechanisms can help to find the necessary balance in a rule of law.

Impact assessment

The European Commission forecasts that the impact studies must be developed, to consider the need for action at the European Union level as well as economic, social and environmental consequences of such an action, when the Commission's initiatives are likely to have important implications for economic, social or environmental regime.

The Commission even gives guidelines for the development of impact assessments including:

  • A 12-week public consultation
  • A clear description of who will be affected by the initiative

The Directive on combating terrorism will have profound implications for the rights and freedoms of European citizens and yet the European Commission has not found it necessary to take time to reflect on the impact of such a regulation, while in several Member States, laws extremely detrimental to the rights and freedoms are adopted or are being adopted, on behalf of the fight against terrorism.

We urgently need a deep reflection to be conducted not only by Member States but also by European institutions on the consequences of the development of security laws, with reviews and analyses of existing laws, their requirements, proportionality and effectiveness.

Notes

  1. The vote in plenary could take place during the month of June 2016
  2. European People's Party that notably includes the French "Les Républicains" party
  3. Recital 11 was initially draft as follows:"Furthermore, the provision of material support for terrorism through persons engaging in or acting as intermediaries in the supply or movement of services, assets and goods, including trade transactions involving the entry into or exit from the Union should be punishable in the Member States, as aiding and abetting terrorism or as terrorism financing if performed with the knowledge that these operations or the proceeds thereof are intended to be used, in full or in part, for terrorist purposes or will benefit terrorist groups"
  4. In the 27 May version of the compromise amendments, the recital had this wording: "(11) The provision of material support for terrorism through persons engaging in or acting as intermediaries in the supply or movement of services, assets and goods, including trade transactions involving the entry into or exit from the Union, should be punishable in the Member States as aiding and abetting terrorism or as terrorism financing if performed with the clear knowledge that these operations or the proceeds thereof are intended to be used, in full or in part, for terrorist purposes or will benefit terrorist groups."
  5. In the 27 May version of the compromise amendments, the title of the article 16 had this wording: "Article 16: Aiding or abetting, inciting and attempting" and the 1st paragraph: "Each Member State shall take the necessary measures to ensure that aiding or abetting an offence referred to in Articles 3 to 8 and 11 to 14 is made punishable."
  6. Should the IP address considered as personal data? This question has never been resolved and was referred to the Court of Justice of the European Union in the context of the C-582/14 Breyer c. Bundesrepublik Deutschland case. The Advocate General concluded that the IP address is personal data, "to the extent that an ISP has additional information which, combined with the dynamic IP address, allows to identify the user". The Court will have to decide soon on this case.
  7. For more information, read the reply sent to the French Council of State by Exegetes Amateurs in the appeal against the administrative blocking of websites.
  8. Text of the amendment: "Member States shall take appropriate action, including through the Internet, such as the provision of information, education and awareness-raising campaigns and the development of alternative narratives to counter terrorist propaganda, where appropriate in cooperation with private companies, relevant civil society organizations, local communities and other stakeholders, aimed at raising awareness and reducing the risk of radicalization and recruitment by terrorist organizations."
  9. See Le Monde (fr) and ZDNet (fr)
  10. European Union Agency for Network & Information Security (ENISA)
  11. European Union's law enforcement agency