French Intelligence Laws

De La Quadrature du Net
Aller à la navigationAller à la recherche


Ambox warning red construction.png
⚠ Travail en cours

Cette page présente un contenu en cours de réalisation.

Si vous souhaitez participer, n'hésitez pas à laisser votre avis sur la page de discussion en suivant au mieux ces recommandations.


Two intelligence law have been passed in France in 2015:

  • The intelligence law on internal intelligence activities
  • The international intelligence law

Both laws have been integrated to the fifth chapter of the internal security code (Code de sécurité intérieure, or CSI).

Why two laws?

The intelligence law on internal intelligence activities, among other legal actions against it, was referred before the French Constitutional Council by the President. The Constitutional Council deemed the law constitutional, except its chapter on intelligence techniques covering international communications (for procedural matters). For this reason, the part of the law dealing with intelligence techniques deployed for international interception is a second law.


The intelligence law on internal intelligence activities

The intelligence law on internal intelligence activities was passed on the 24th of July 2015, through the fast-track procedure. Its provisions can be found in the Code of internal security (Code de la sécurité intérieure, CSI). Here are its provisions, translated by La Quadrature du Net:


BOOK VIII: INTELLIGENCE

Article L801-1

Respect for privacy, in all its components, including privacy of correspondence, protection of personal data and inviolability of the home, is guaranteed by law. Authorities may override it solely in case of public interest necessities provided for by law, within the limits fixed by it and in compliance with the principle of proportionality.

The approval and implementation of intelligence gathering techniques mentioned in Chapters I-III of Title V of this book on the national territory can only be decided if:

1. They stem from a legally competent authority;

2. They stem from a procedure conforming with Title II of the same book;

3. They comply with missions assigned to the services referred to in Article L. 811-2 or services designated by a decree of the Council of State (Conseil d'Etat), as provided in Article L. 811-4; %% Faire une footnote pour CE

4. They are justified by threats, risks and issues related to the fundamental interests of the Nation mentioned in Article L. 811-3;

5. Their interferences on privacy are proportionate to stated purposes.

The National Supervisory Commission for Intelligence-Gathering Techniques shall ensure, as provided for in this book, compliance with these principles. The Council of State rules on legal actions brought against decisions relating to the authorisation and implementation of these techniques and those relating to the retention of the collected information.

TITLE I: GENERAL PROVISIONS

Article L811-1

The public intelligence policy contributes to the strategy for national security and the defense and promotion of the fundamental interests of the Nation. It falls within the exclusive jurisdiction of the State.

Article L811-2

The specialised intelligence services are designated by decree of the Council of State. Their missions, within France and abroad, are to search, collect, process and provide the Government with information related to the geopolitical and strategic issues as well as threats and risks that may affect the life of the Nation. They contribute to the knowledge and anticipation of these issues and the prevention and obstruction of such risks and threats.

They act in compliance with the law, under the authority of the Government and in accordance with the guidelines established by the National Intelligence Council.

The implementation on the national territory of Chapter II of Title II and Chapters I to III of Title V of this book is without prejudice to the second paragraph of Article 40 of the Code of Criminal Procedure.

Article L811-3

For the sole exercise of their respective missions, the specialised intelligence services may use techniques mentioned in Title V of this book for the collection of information regarding the defense and promotion of the following fundamental interests of the Nation:

1. National independence, territorial integrity and national defense;

2. Major interests in foreign policy, implementation of European and international obligations of France and prevention of all forms of foreign interference;

3. Major economic, industrial and scientific interests of France;

4. Prevention of terrorism;

5. Prevention of: a) Attacks on the republican nature of institutions; b) Actions towards continuation or reconstitution of groups disbanded under Article L. 212-1; c) Collective violence likely to cause serious harm to public peace;

6. Prevention of organised crime and delinquency;

7. Prevention of proliferation of weapons of mass destruction.

Article L811-4

A decree of the Council of State, issued after consultation of the National Supervisory Commission for Intelligence-Gathering Techniques, shall designate services other than the specialised intelligence services, reporting to the Ministers of Defense and Interior as well as Ministers in charge of the economy, budget or customs, which may be authorised to use techniques covered by title V of this book as provided in the same book. It specifies, for each service, the purposes mentioned in Article L. 811-3 and techniques that can be considered for authorisation.

Article L811-5

Measures taken by public authorities to monitor and control radio communications for the specific defense of national interests are not subject to the provisions of this book, nor to those of sub-section 2 section 3 of chapter I of title III of book I of the code of criminal procedure.



The international intelligence law

The international intelligence law was passed on the 30th of November. Its provisions can be found in the Code of internal security (Code de la sécurité intérieure, CSI). Here are its provisions, translated by La Quadrature du Net:

Chapter IV: Surveillance techniques for international electronic communications

Article L854-1

Under the conditions set forth in the present chapter, surveillance of communications emitted from or received abroad may be authorised, solely for the purposes of defense and promotion of the fundamental interests of the Nation as mentioned in article L. 811-3. This surveillance is exclusively covered by this chapter, whether it relates to the content of the communication or to its metadata.

Measures taken in this respect cannot be designed for individual monitoring targeting communications of people using subscription numbers or identifiers traceable to the national territory, unless these people are communicating from abroad, and were either the targets of an authorisation allowing security interception issued pursuant to Article L. 852-1 on the date on which they left the country or are identified as posing a threat to the fundamental interests of the nation mentioned in Article L. 811-3.

Subject to the specific provisions of the third paragraph of this article, when it is apparent that the intercepted electronic communications are being exchanged between people or equipment using subscription numbers or identifiers traceable to national territory, including when such communications transit through through equipment non-traceable to national territory, they shall be immediately deleted.

Article L854-2

I. -The Prime Minister shall designate, by a reasoned decision, the electronic communications networks over which interception of communications emitted from or received abroad will be permitted, within the limits laid down in Article L. 854-1.

II. -Upon reasoned request by ministers or their deputies mentioned in the first paragraph of Article L. 821-2, the Prime Minister or one of the delegates mentioned in Article L. 821-4 may authorise the non-individualised exploitation of intercepted metadata.

The authorisation establishes:
1º The pursued objective(s) among those mentioned in Article L. 811-3;
2º The reason(s) for action;
3° The service(s) referred to in Article L. 811-2 in charge of the exploitation of connection data;
4º The type of automated processes that may be deployed, indicating their objective. The authorisation is issued for a maximum period of one year, renewable under the same conditions as laid down in the present paragraph/section (II).


III. Upon reasoned request by ministers or their deputies mentioned in the first paragraph of Article L. 821-2, the Prime Minister or one of their delegates may also issue authorisation to exploit intercepted communications or exploit metadata alone.

The authorisation establishes:
1º The pursued objective(s) among those mentioned in Article L. 811-3;
2º The reason(s) for action;
3º The geographical areas or concerned organisations, groups or individuals;
4º The service(s) mentioned in Article L. 811-2 in charge of this operation.
The authorisation is issued for a maximum period of four months, renewable under the same conditions as laid down in the present paragraph/section (III).


Article L854-3

Persons holding an office or praticing a profession in France as mentioned in Article L. 821-7 may not be subject to individual monitoring of their communications due to their excercising their mandate or profession.

Article L854-4

Interception and exploitation of communications as defined by the present chapter shall be subject to traceability mechanisms established by the Prime Minister after consultation with the National Supervisory Commission for Intelligence-Gathering Techniques. The Prime Minister shall establish the terms of the centralisation of the collected information.


Article L854-5

Subject to the specific provisions of Article L. 854-8, intelligence collected under this chapter shall be deleted after a period of: 1. Twelve months after the first exploitation for correspondence, within a period of four years following their collection; 2. Six years following their collection for metadata. As for encrypted information, the allowed duration for exploitation starts from its decryption. It may not be retained for over eight years after collection.

To the extent strictly necessary for the needs of technical analysis, and excluding use for the surveillance of the concerned individuals, information collected under the present chapter that contains elements of cyberattack or that is encrypted, including decrypted associated information, may be retained beyond the durations mentioned in this article.

Notwithstanding the first five paragraphs, intelligence pertaining to a request that the Council of State has received may not be destroyed. Upon expiration of the time periods set forth in the present article, they are retained for the sole purposes of proceedings before the Council of State.


Article L854-6

Subject to the specific provisions of Article L. 854-8, the information collected under the present chapter is utilized by the service or services referred to in Article L. 811-2 designated by the authorisation.

Intelligence may not be collected, transcripted or extracted for purposes other than those mentioned in Article L. 811-3.

Transcripts or extractions must be destroyed once their retention is no longer essential to the pursuit of the objectives mentioned in the same Article L. 811-3.

Destruction of collected information, transcripts and extractions is performed by individually designated and authorized agents and is recorded.


Article L854-7

The conditions laid down in Articles L. 871-6 and L. 871-7 apply to material operations performed by electronic communications operators for the deployment of the measures provided for in Section I of Article L. 854-2.

Article L854-8

When the intercepted correspondence refers to subscriber numbers, or to technical identifiers that are traceable to the national territory, they are exploited in accordance with the IV and V of Article L. 852-1 and retained and deleted in accordance with Articles L. 822-2 to L. 822-4, subject to the oversight of the National Supervisory Commission for Intelligence-Gathering Techniques. The retention period for correspondence starts from its first exploitation, but may not exceed six months from its collection. Metadata associated with such correspondence is retained and deleted in accordance with Articles L. 822-2 similar to L. 822-4.


Article L854-9

The National Supervisory Commission for Intelligence-Gathering Techniques shall be informed of all decisions and authorisations referred to in Article L. 854-2. It shall enjoy permanent, comprehensive and direct access to traceability instruments referred to in Article L. 854-4, the collected intelligence, to transcripts and performed extractions as well as to records referred to in Article L. 854-6 . Upon request, it may review the technical devices necessary for the execution of the decisions and authorisations. If surveillance of persons referred in the third paragraph of Article L. 854-1 has not already been the object of a specific authorisation, their identity is promptly communicated to the Commission.

The Commission may request all elements necessary to the accomplishment of its missions from the Prime Minister.

Article L. 833-3 is applicable to checks carried out by the Commission under this section.

On its own initiative or by request of any person wishing to verify that no surveillance measure is irregularly being performed against them, the Commission shall ensure that the measures implemented under this chapter meet the conditions that it specifies as well as those defined by the regulations made thereunder and the decisions and authorisations of the Prime Minister or his delegates. It shall notify the claimant that it has carried out the necessary checks, without confirming nor denying the deployment of surveillance measures.

When it finds a violation of the present chapter, the Commission issues a recommendation to the Prime Minister to cease the violation, and if necessary to delete the collected intelligence. If the Prime Minister does not follow the recommendation or if the results are deemed insufficient, the matter may be brought before the Council of State, ruling in accordance with Chapter III of Title VII bis of Book VII of the Code of Administrative Justice, by the President or by at least three members of the Commission.

The Commission may submit at any time to the Prime Minister the recommendations and observations it considers appropriate to perform its oversight function with regard to the application of the present chapter.