SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...Anti-terrorism measures
Censoring the web, making us less secure
@kirst3nf
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...
Populism
Opportunism
Ideology
What now?
Populism
the driver since 9/11
I. Measures since 9/11
Year EU anti-terrorism measures
2001 EU terrorist “blacklists”
2001 Common Position on combating terrorism
2002 Council Framework Decision on Terrorism
2003 Regulation on the implementation of the common basic standards on aviation
security
2004 EU Council declaration on combatting terrorism containing 57 specific measures,
among them:
2004 Directive on the obligation of carrier to communicate passenger data [API Directive]
2004 Regulation on standards for security features and biometrics in passports and travel
documents issued by Member States
2005 Prüm Convention (MS exchange data on DNA, fingerprints and vehicle registration of
concerned persons and to cooperate against terrorism)
2005 Third anti-money laundering Directive
2006 Regulation on the establishment, operation and use of the second generation
Schengen Information System (SIS II)
2006 Data Retention Directive [repealed]
2010 EU/USA Agreement: processing and transfer of Financial Messaging Data [SWIFT] for
purposes of the Terrorist Finance Tracking Program [TFTP]
2012 EU/USA Agreement: use and transfer of passenger name records (PNR) to the United
States DHS
Opportunism
2015/2016 attacks
“Never waste a good crisis!”
- Jan Jambon, Belgian Interior Minister
quoting Winston Churchill, 28 September 2016
EU
2015 - 2016 EU Internet Forum
2016 Directive on the use of Passenger Name Records (EU PNR)
2016 Europol Regulation
2016 Launch of European Counter Terrorism Centre (ECTC)
2016 Creation of a new portfolio on security: Commissioner Sir Julian
King
201? Anti-Terrorism Directive
Ideology
the Anti-Terrorism Directive
Public
debate/event
Policy Timeline
Political
debates
Policy
options
Public
debate/event
Policy Timeline
Commission
Political
debates
Policy
options
Public
debate/event
Policy Timeline
Commission
Political
debates
Policy
options
Public
debate/event
Proposal
and
impact ass.
Policy Timeline
Policy
options
Proposal
and
Impact Ass.
Policy Timeline
Council
Parliament
Commission
Political
debates
Public
debate/event
Policy
options
Proposal
and
Impact Ass.
Policy Timeline
Member
States
Council
Parliament
Commission
Decision
Political
debates
Public
debate/event
Commission
Political
debates
Public
debate/event
Advocacy
Proposal
and
Impact Ass.
Policy
options
13/11/15 2/12/15
Anti-Terrorism Directive
11/3/16
12/7/16
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...
Ideology: no evidence needed
Member
States
Council
Parliament
Commission
Political
debates
Public
debate/event
Advocacy
Proposal
and
Impact Ass.
Decision
Policy
options
13/11/15 2/12/15
Anti-Terrorism Directive
11/3/16
12/7/16
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...
Ideology: no political debate needed
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...Ideology: no nuanced
approach needed
Anti-Terrorism Directive
Financing, travel, radicalisation
and cybercyber
Anti-Terrorism Directive
1. Vague definitions
2. Blocking & censorship
3. Weakening of encryption,
interception
4. Attacks on information systems
1. Vague definitions
“increasing misuse of the internet for
terrorist purposes”
“indirect provocation”
“radicalisation of citizens”
“glorification and justification of terrorism”
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...Ideology:
definitions not needed
Recital (7b) An effective means of combatting terrorism on the internet is to
remove illegal terrorist content at source. In that context, this Directive is without
prejudice to voluntary action taken by the internet industry to prevent the misuse
of its services or to any support for such action by Member States, such as
detecting and flagging illegal content. Member States should take all necessary
measures to remove or to block access to web pages publicly inciting others to
commit terrorist offences. Where such measures are taken, they should be in line
with transparent procedures and subject to adequate safeguards under the
control of independent authorities. Member States should use their best
endeavours to cooperate with third countries in seeking to secure the removal of
such content from servers within their territory. However, when removal of illegal
content at its source is not possible, Member States should be able to put in
place measures to block access from Union territory to web pages identified as
containing or disseminating terrorist content. Member States should consider
legal action against internet and social media companies and service providers
which deliberately refuse to comply with a legal order to delete illegal content
extolling terrorism from their internet platforms after being duly notified about
such content. Any refusal should be punishable by effective, proportionate and
dissuasive sanctions. The right to judicial review should be guaranteed to the
internet and social media companies and service providers.
In that context, this Directive is without prejudice
to voluntary action taken by the internet industry
to prevent the misuse of its services or to any
support for such action by Member States, such as
detecting and flagging illegal content.
2. Blocking and censorship
Recital (7b) An effective means of combatting terrorism on the internet is to
remove illegal terrorist content at source. In that context, this Directive is without
prejudice to voluntary action taken by the internet industry to prevent the misuse
of its services or to any support for such action by Member States, such as
detecting and flagging illegal content. Member States should take all necessary
measures to remove or to block access to web pages publicly inciting others to
commit terrorist offences. Where such measures are taken, they should be in line
with transparent procedures and subject to adequate safeguards under the
control of independent authorities. Member States should use their best
endeavours to cooperate with third countries in seeking to secure the removal of
such content from servers within their territory. However, when removal of illegal
content at its source is not possible, Member States should be able to put in
place measures to block access from Union territory to web pages identified as
containing or disseminating terrorist content. Member States should consider
legal action against internet and social media companies and service providers
which deliberately refuse to comply with a legal order to delete illegal content
extolling terrorism from their internet platforms after being duly notified about
such content. Any refusal should be punishable by effective, proportionate and
dissuasive sanctions. The right to judicial review should be guaranteed to the
internet and social media companies and service providers.
Member States should take all necessary measures to
remove or to block access to web pages publicly inciting
others to commit terrorist offences.
2. Blocking and censorship
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...
Ideology:
no need for measures
that actually work
Recital (15d) The fact that terrorist organisations
rely heavily upon various electronic tools, the
internet and social media to communicate, promote,
and incite terrorist acts, to recruit potential fighters,
to collect funds, or to arrange for other support for
their activities, creates challenges in investigations
and prosecutions of terrorist offences. Member
States should therefore cooperate with each other
notably through Eurojust and Europol and with the
Commission to ensure a coordinated approach in
dealing with the gathering, sharing, and
admissibility of electronic evidence.
3. Encryption & interception
Recital (15d) The fact that terrorist organisations
rely heavily upon various electronic tools, the
internet and social media to communicate, promote,
and incite terrorist acts, to recruit potential fighters,
to collect funds, or to arrange for other support for
their activities, creates challenges in investigations
and prosecutions of terrorist offences. Member
States should therefore cooperate with each other
notably through Eurojust and Europol and with the
Commission to ensure a coordinated approach in
dealing with the gathering, sharing, and
admissibility of electronic evidence.
3. Encryption & interception
ensure a coordinated approach in dealing with the
gathering, sharing, and admissibility of electronic
evidence.
Recital (15f) A Eurojust report of November
2014 notes that the growing sophistication
and wider use of anonymisers, proxy
servers, the Tor network, satellite links
and foreign 3G networks create additional
challenges to the gathering and analysis of
electronic evidence, which are rendered
even greater by the storage of data in the
cloud.
[not adopted]
3. Encryption & interception
IV. What can I do?
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...
Ideology: real security not needed
3. Encryption & interception
Recital (15a) To ensure the success of investigations
[...], those responsible for investigating and prosecuting
such offences should have the possibility to make use
of effective investigative tools such as those which are
used in combating organised crime or other serious
crimes.
Such tools should [...] include, for example, the search of
any personal property, the interception of
communications, covert surveillance including
electronic surveillance, the taking and the fixing of audio
recordings in private or public vehicles and places, and
of visual images of persons in public vehicles and
places, (…) and financial investigations(…).
Recital (15a) To ensure the success of investigations and the
prosecution of terrorist offences, offences related to a
terrorist group or offences related to terrorist activities, those
responsible for investigating and prosecuting such offences
should have the possibility to make use of effective
investigative tools such as those which are used in
combating organised crime or other serious crimes. Such
tools should, where appropriate, while taking into account
the principle of proportionality and the nature and
seriousness of the offences under investigation in
accordance with national law, include, for example, the
search of any personal property, the interception of
communications, covert surveillance including electronic
surveillance, the taking and the fixing of audio recordings in
private or public vehicles and places, and of visual images of
persons in public vehicles and places, (…) and financial
investigations(…).
3. Encryption & interception
include, for example, the search of any personal property,
the interception of communications, covert surveillance
including electronic surveillance, the taking and the
fixing of audio recordings in private or public vehicles
and places, and of visual images of persons in public
vehicles and places,
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...
Ideology:
privacy not needed
4. Attacks on information systems
Article 3 - Terrorist offences
ha) attacks against information
systems as defined in Articles 3 to 7 of
Directive 2013/40/EU of the European
Parliament and of the Council;
(i)seriously threatening to commit any
of the acts listed in points (a) to (h)
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...
Ideology:
real security not needed
EU Council:
+ surveillance
+ interception
EU Parliament:
+ web blocking
+ attacks against computer systems
CONCLUSION
Member
States
Council
Parliament
Commission
Political
debates
Public
debate/event
Advocacy
Policy
options
13/11/15 2/12/15
II. Anti-Terrorism Directive
11/3/16
12/7/16
Proposal
and
Impact Ass.
Decision
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...
What now?
What now?
1. Blog, tweet etc.
2. Contact MEP Hohlmeier
3. Contact S&D (especially Germans)
4. Contact your permanent representation
/ Ministry
We draw avery important
conclusion here with a
merely dark image behind it,
so the text is white...
Thanks!
@kirst3nf
kirsten.fiedler@edri.org
@edri
https://edri.org

Contenu connexe

Tendances

Assessing the Impact of Mobile Consolidation on Innovation and Quality (Seraf...
Assessing the Impact of Mobile Consolidation on Innovation and Quality (Seraf...Assessing the Impact of Mobile Consolidation on Innovation and Quality (Seraf...
Assessing the Impact of Mobile Consolidation on Innovation and Quality (Seraf...FSR Communications and Media
 
2011 10-12whatiseutimberregulation-111018054148-phpapp01
2011 10-12whatiseutimberregulation-111018054148-phpapp012011 10-12whatiseutimberregulation-111018054148-phpapp01
2011 10-12whatiseutimberregulation-111018054148-phpapp01LoggingOff
 
Getting the Deal Through: Telecoms and Media 2016
Getting the Deal Through: Telecoms and Media 2016Getting the Deal Through: Telecoms and Media 2016
Getting the Deal Through: Telecoms and Media 2016Matheson Law Firm
 
EU voert strijd op tegen 'desinformatie'
EU voert strijd op tegen 'desinformatie'EU voert strijd op tegen 'desinformatie'
EU voert strijd op tegen 'desinformatie'Thierry Debels
 
Expert Meeting on Binding Corporate Rules | Presentations
Expert Meeting on Binding Corporate Rules | PresentationsExpert Meeting on Binding Corporate Rules | Presentations
Expert Meeting on Binding Corporate Rules | PresentationsHiiL
 
Event “Enhancing the skills of youth with learning disabilities” on 22 June 2...
Event “Enhancing the skills of youth with learning disabilities” on 22 June 2...Event “Enhancing the skills of youth with learning disabilities” on 22 June 2...
Event “Enhancing the skills of youth with learning disabilities” on 22 June 2...Karel Van Isacker
 
Filing, publicizing, control and verification of declarations of public serva...
Filing, publicizing, control and verification of declarations of public serva...Filing, publicizing, control and verification of declarations of public serva...
Filing, publicizing, control and verification of declarations of public serva...Maksym Klyuchar
 
20150610 febelmar privacy matters eu regulation
20150610 febelmar privacy matters eu regulation20150610 febelmar privacy matters eu regulation
20150610 febelmar privacy matters eu regulationFebelmar
 
Getting The Deal Through: Telecoms & Media Market Intelligence 2016
Getting The Deal Through: Telecoms & Media Market Intelligence 2016Getting The Deal Through: Telecoms & Media Market Intelligence 2016
Getting The Deal Through: Telecoms & Media Market Intelligence 2016Matheson Law Firm
 
CYBERHATE: an issue of continued concern for the Council of Europe's anti-rac...
CYBERHATE: an issue of continued concern for the Council of Europe's anti-rac...CYBERHATE: an issue of continued concern for the Council of Europe's anti-rac...
CYBERHATE: an issue of continued concern for the Council of Europe's anti-rac...Council of Europe (CoE)
 
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...LawScienceTech
 
US – EU Safe Harbor for Cross-Border Data
US – EU Safe Harbor for Cross-Border DataUS – EU Safe Harbor for Cross-Border Data
US – EU Safe Harbor for Cross-Border DataMark Aldrich
 

Tendances (17)

Is the algorithm reliable? The collaboration between technology and humans in...
Is the algorithm reliable? The collaboration between technology and humans in...Is the algorithm reliable? The collaboration between technology and humans in...
Is the algorithm reliable? The collaboration between technology and humans in...
 
Assessing the Impact of Mobile Consolidation on Innovation and Quality (Seraf...
Assessing the Impact of Mobile Consolidation on Innovation and Quality (Seraf...Assessing the Impact of Mobile Consolidation on Innovation and Quality (Seraf...
Assessing the Impact of Mobile Consolidation on Innovation and Quality (Seraf...
 
2011 10-12whatiseutimberregulation-111018054148-phpapp01
2011 10-12whatiseutimberregulation-111018054148-phpapp012011 10-12whatiseutimberregulation-111018054148-phpapp01
2011 10-12whatiseutimberregulation-111018054148-phpapp01
 
Internet in Ukraine
Internet in UkraineInternet in Ukraine
Internet in Ukraine
 
Getting the Deal Through: Telecoms and Media 2016
Getting the Deal Through: Telecoms and Media 2016Getting the Deal Through: Telecoms and Media 2016
Getting the Deal Through: Telecoms and Media 2016
 
EU voert strijd op tegen 'desinformatie'
EU voert strijd op tegen 'desinformatie'EU voert strijd op tegen 'desinformatie'
EU voert strijd op tegen 'desinformatie'
 
Expert Meeting on Binding Corporate Rules | Presentations
Expert Meeting on Binding Corporate Rules | PresentationsExpert Meeting on Binding Corporate Rules | Presentations
Expert Meeting on Binding Corporate Rules | Presentations
 
Event “Enhancing the skills of youth with learning disabilities” on 22 June 2...
Event “Enhancing the skills of youth with learning disabilities” on 22 June 2...Event “Enhancing the skills of youth with learning disabilities” on 22 June 2...
Event “Enhancing the skills of youth with learning disabilities” on 22 June 2...
 
Reka Somssich, Sources of the EU Law and decision making institutional framew...
Reka Somssich, Sources of the EU Law and decision making institutional framew...Reka Somssich, Sources of the EU Law and decision making institutional framew...
Reka Somssich, Sources of the EU Law and decision making institutional framew...
 
Filing, publicizing, control and verification of declarations of public serva...
Filing, publicizing, control and verification of declarations of public serva...Filing, publicizing, control and verification of declarations of public serva...
Filing, publicizing, control and verification of declarations of public serva...
 
20150610 febelmar privacy matters eu regulation
20150610 febelmar privacy matters eu regulation20150610 febelmar privacy matters eu regulation
20150610 febelmar privacy matters eu regulation
 
Getting The Deal Through: Telecoms & Media Market Intelligence 2016
Getting The Deal Through: Telecoms & Media Market Intelligence 2016Getting The Deal Through: Telecoms & Media Market Intelligence 2016
Getting The Deal Through: Telecoms & Media Market Intelligence 2016
 
Euroispa annual report 2017
Euroispa annual report 2017Euroispa annual report 2017
Euroispa annual report 2017
 
Police cooperation within the eu
Police cooperation within the euPolice cooperation within the eu
Police cooperation within the eu
 
CYBERHATE: an issue of continued concern for the Council of Europe's anti-rac...
CYBERHATE: an issue of continued concern for the Council of Europe's anti-rac...CYBERHATE: an issue of continued concern for the Council of Europe's anti-rac...
CYBERHATE: an issue of continued concern for the Council of Europe's anti-rac...
 
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
 
US – EU Safe Harbor for Cross-Border Data
US – EU Safe Harbor for Cross-Border DataUS – EU Safe Harbor for Cross-Border Data
US – EU Safe Harbor for Cross-Border Data
 

En vedette

Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and TerrorismAmanda Tapp
 
Smart City Strategy: Platform, Data, People
Smart City Strategy: Platform, Data, PeopleSmart City Strategy: Platform, Data, People
Smart City Strategy: Platform, Data, PeopleJin-Hyeok Yang
 
Route to PA Project Meeting Dublinked Presentation 03.12.2015
Route to PA Project Meeting Dublinked Presentation 03.12.2015Route to PA Project Meeting Dublinked Presentation 03.12.2015
Route to PA Project Meeting Dublinked Presentation 03.12.2015Dublinked .
 
Effective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent ExtremismEffective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent ExtremismENODO Global, Inc.
 
BIG IoT Project Overview
BIG IoT Project OverviewBIG IoT Project Overview
BIG IoT Project OverviewBIG IoT Project
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
OSGi for European and Japanese smart cities - experiences and lessons learnt ...
OSGi for European and Japanese smart cities - experiences and lessons learnt ...OSGi for European and Japanese smart cities - experiences and lessons learnt ...
OSGi for European and Japanese smart cities - experiences and lessons learnt ...mfrancis
 
PNDA - Platform for Network Data Analytics
PNDA - Platform for Network Data AnalyticsPNDA - Platform for Network Data Analytics
PNDA - Platform for Network Data AnalyticsJohn Evans
 
Choosing technologies for a big data solution in the cloud
Choosing technologies for a big data solution in the cloudChoosing technologies for a big data solution in the cloud
Choosing technologies for a big data solution in the cloudJames Serra
 
Global terrorism
Global terrorism Global terrorism
Global terrorism namaniitian
 
Terrorism In Pakistan
Terrorism In PakistanTerrorism In Pakistan
Terrorism In PakistanUsama Malik
 
Introduction to Microsoft’s Hadoop solution (HDInsight)
Introduction to Microsoft’s Hadoop solution (HDInsight)Introduction to Microsoft’s Hadoop solution (HDInsight)
Introduction to Microsoft’s Hadoop solution (HDInsight)James Serra
 
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...SocialCops
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 

En vedette (16)

Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and Terrorism
 
Smart City Strategy: Platform, Data, People
Smart City Strategy: Platform, Data, PeopleSmart City Strategy: Platform, Data, People
Smart City Strategy: Platform, Data, People
 
Route to PA Project Meeting Dublinked Presentation 03.12.2015
Route to PA Project Meeting Dublinked Presentation 03.12.2015Route to PA Project Meeting Dublinked Presentation 03.12.2015
Route to PA Project Meeting Dublinked Presentation 03.12.2015
 
Effective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent ExtremismEffective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent Extremism
 
BIG IoT Project Overview
BIG IoT Project OverviewBIG IoT Project Overview
BIG IoT Project Overview
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
OSGi for European and Japanese smart cities - experiences and lessons learnt ...
OSGi for European and Japanese smart cities - experiences and lessons learnt ...OSGi for European and Japanese smart cities - experiences and lessons learnt ...
OSGi for European and Japanese smart cities - experiences and lessons learnt ...
 
Economic Terrorism in Pakistan
Economic Terrorism in PakistanEconomic Terrorism in Pakistan
Economic Terrorism in Pakistan
 
PNDA - Platform for Network Data Analytics
PNDA - Platform for Network Data AnalyticsPNDA - Platform for Network Data Analytics
PNDA - Platform for Network Data Analytics
 
RUN Digital Cluster 2017
RUN Digital Cluster 2017RUN Digital Cluster 2017
RUN Digital Cluster 2017
 
Choosing technologies for a big data solution in the cloud
Choosing technologies for a big data solution in the cloudChoosing technologies for a big data solution in the cloud
Choosing technologies for a big data solution in the cloud
 
Global terrorism
Global terrorism Global terrorism
Global terrorism
 
Terrorism In Pakistan
Terrorism In PakistanTerrorism In Pakistan
Terrorism In Pakistan
 
Introduction to Microsoft’s Hadoop solution (HDInsight)
Introduction to Microsoft’s Hadoop solution (HDInsight)Introduction to Microsoft’s Hadoop solution (HDInsight)
Introduction to Microsoft’s Hadoop solution (HDInsight)
 
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
Building Smart Cities: The Data-Driven Way (Created For The Big 5 Construct 2...
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 

Similaire à 12.NP: Anti-terrorism measures - Censoring the web, making us less secure

The Digital Services Act - soon in your country
The Digital Services Act - soon in your countryThe Digital Services Act - soon in your country
The Digital Services Act - soon in your countryKirsten Fiedler
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Brian Honan
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying reviewRepentSinner
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying reviewAnonDownload
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
resubmissionS&Lpaper.konstantina_mintzoli copy
resubmissionS&Lpaper.konstantina_mintzoli copyresubmissionS&Lpaper.konstantina_mintzoli copy
resubmissionS&Lpaper.konstantina_mintzoli copyKonstantina Mintzoli
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
Involving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and securityInvolving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and securityblogzilla
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Ministersegughana
 
Should online platforms do more to tackle unlawful content online? (Eleonora ...
Should online platforms do more to tackle unlawful content online? (Eleonora ...Should online platforms do more to tackle unlawful content online? (Eleonora ...
Should online platforms do more to tackle unlawful content online? (Eleonora ...Eleonora Rosati
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityDavid Sweigert
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseSarkis Darbinyan
 

Similaire à 12.NP: Anti-terrorism measures - Censoring the web, making us less secure (20)

CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
The Digital Services Act - soon in your country
The Digital Services Act - soon in your countryThe Digital Services Act - soon in your country
The Digital Services Act - soon in your country
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying review
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying review
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
resubmissionS&Lpaper.konstantina_mintzoli copy
resubmissionS&Lpaper.konstantina_mintzoli copyresubmissionS&Lpaper.konstantina_mintzoli copy
resubmissionS&Lpaper.konstantina_mintzoli copy
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
Involving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and securityInvolving citizens in assessing dilemmas of privacy and security
Involving citizens in assessing dilemmas of privacy and security
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Minister
 
Protecting whistleblowers
Protecting whistleblowersProtecting whistleblowers
Protecting whistleblowers
 
Should online platforms do more to tackle unlawful content online? (Eleonora ...
Should online platforms do more to tackle unlawful content online? (Eleonora ...Should online platforms do more to tackle unlawful content online? (Eleonora ...
Should online platforms do more to tackle unlawful content online? (Eleonora ...
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology Security
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov case
 
Recommendation report tcn (1)
Recommendation report tcn (1)Recommendation report tcn (1)
Recommendation report tcn (1)
 

Plus de Kirsten Fiedler

2023 Digitale Dienste Gesetz und politische Werbung - ein Überblick auf dem A...
2023 Digitale Dienste Gesetz und politische Werbung - ein Überblick auf dem A...2023 Digitale Dienste Gesetz und politische Werbung - ein Überblick auf dem A...
2023 Digitale Dienste Gesetz und politische Werbung - ein Überblick auf dem A...Kirsten Fiedler
 
2021 Bundeskonferenz BAG - Digitale Sicherheit, persönliche Rechte
2021 Bundeskonferenz BAG - Digitale Sicherheit, persönliche Rechte2021 Bundeskonferenz BAG - Digitale Sicherheit, persönliche Rechte
2021 Bundeskonferenz BAG - Digitale Sicherheit, persönliche RechteKirsten Fiedler
 
#rc3 - Ddie deutsche Ratspräsidentschaft
#rc3 - Ddie deutsche Ratspräsidentschaft#rc3 - Ddie deutsche Ratspräsidentschaft
#rc3 - Ddie deutsche RatspräsidentschaftKirsten Fiedler
 
How the EU works, when and where get active
How the EU works, when and where get activeHow the EU works, when and where get active
How the EU works, when and where get activeKirsten Fiedler
 
About EDRi & our main topics
About EDRi & our main topicsAbout EDRi & our main topics
About EDRi & our main topicsKirsten Fiedler
 
WePromise.eu and Project Library @FNF18
WePromise.eu and Project Library @FNF18WePromise.eu and Project Library @FNF18
WePromise.eu and Project Library @FNF18Kirsten Fiedler
 
Rage against the Censorship Machine (aka copyright directive)
Rage against the Censorship Machine (aka copyright directive)Rage against the Censorship Machine (aka copyright directive)
Rage against the Censorship Machine (aka copyright directive)Kirsten Fiedler
 
Bursting the Brussels Bubble! Wie kann Zivilgesellschaft wirksam Einfluss auf...
Bursting the Brussels Bubble! Wie kann Zivilgesellschaft wirksam Einfluss auf...Bursting the Brussels Bubble! Wie kann Zivilgesellschaft wirksam Einfluss auf...
Bursting the Brussels Bubble! Wie kann Zivilgesellschaft wirksam Einfluss auf...Kirsten Fiedler
 
re:publica 2016 #rpTEN: How the EU works
re:publica 2016 #rpTEN: How the EU worksre:publica 2016 #rpTEN: How the EU works
re:publica 2016 #rpTEN: How the EU worksKirsten Fiedler
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLKirsten Fiedler
 
How the EU works and how to get involved
How the EU works and how to get involvedHow the EU works and how to get involved
How the EU works and how to get involvedKirsten Fiedler
 
#LOTE5: The EU and its people - a failure in democracy
#LOTE5: The EU and its people - a failure in democracy#LOTE5: The EU and its people - a failure in democracy
#LOTE5: The EU and its people - a failure in democracyKirsten Fiedler
 
32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-makingKirsten Fiedler
 
re:publica 2015: Internet censorship around Europe since ACTA
re:publica 2015: Internet censorship around Europe since ACTAre:publica 2015: Internet censorship around Europe since ACTA
re:publica 2015: Internet censorship around Europe since ACTAKirsten Fiedler
 
Netzpolitik und digitale Grundrechte in der EU - Netzneutralität und Urheberr...
Netzpolitik und digitale Grundrechte in der EU - Netzneutralität und Urheberr...Netzpolitik und digitale Grundrechte in der EU - Netzneutralität und Urheberr...
Netzpolitik und digitale Grundrechte in der EU - Netzneutralität und Urheberr...Kirsten Fiedler
 
Guide pratique pour un Etat de surveillance parfait
Guide pratique pour un Etat de surveillance parfaitGuide pratique pour un Etat de surveillance parfait
Guide pratique pour un Etat de surveillance parfaitKirsten Fiedler
 
#rp13 - Praktische Anleitung für den fürsorglichen Überwachungsstaat
#rp13 - Praktische Anleitung für den fürsorglichen Überwachungsstaat#rp13 - Praktische Anleitung für den fürsorglichen Überwachungsstaat
#rp13 - Praktische Anleitung für den fürsorglichen ÜberwachungsstaatKirsten Fiedler
 
Net neutrality - State of play in the EU
Net neutrality - State of play in the EUNet neutrality - State of play in the EU
Net neutrality - State of play in the EUKirsten Fiedler
 
Activists guide to the EU
Activists guide to the EUActivists guide to the EU
Activists guide to the EUKirsten Fiedler
 
ACTA campaigns in Europe
ACTA campaigns in EuropeACTA campaigns in Europe
ACTA campaigns in EuropeKirsten Fiedler
 

Plus de Kirsten Fiedler (20)

2023 Digitale Dienste Gesetz und politische Werbung - ein Überblick auf dem A...
2023 Digitale Dienste Gesetz und politische Werbung - ein Überblick auf dem A...2023 Digitale Dienste Gesetz und politische Werbung - ein Überblick auf dem A...
2023 Digitale Dienste Gesetz und politische Werbung - ein Überblick auf dem A...
 
2021 Bundeskonferenz BAG - Digitale Sicherheit, persönliche Rechte
2021 Bundeskonferenz BAG - Digitale Sicherheit, persönliche Rechte2021 Bundeskonferenz BAG - Digitale Sicherheit, persönliche Rechte
2021 Bundeskonferenz BAG - Digitale Sicherheit, persönliche Rechte
 
#rc3 - Ddie deutsche Ratspräsidentschaft
#rc3 - Ddie deutsche Ratspräsidentschaft#rc3 - Ddie deutsche Ratspräsidentschaft
#rc3 - Ddie deutsche Ratspräsidentschaft
 
How the EU works, when and where get active
How the EU works, when and where get activeHow the EU works, when and where get active
How the EU works, when and where get active
 
About EDRi & our main topics
About EDRi & our main topicsAbout EDRi & our main topics
About EDRi & our main topics
 
WePromise.eu and Project Library @FNF18
WePromise.eu and Project Library @FNF18WePromise.eu and Project Library @FNF18
WePromise.eu and Project Library @FNF18
 
Rage against the Censorship Machine (aka copyright directive)
Rage against the Censorship Machine (aka copyright directive)Rage against the Censorship Machine (aka copyright directive)
Rage against the Censorship Machine (aka copyright directive)
 
Bursting the Brussels Bubble! Wie kann Zivilgesellschaft wirksam Einfluss auf...
Bursting the Brussels Bubble! Wie kann Zivilgesellschaft wirksam Einfluss auf...Bursting the Brussels Bubble! Wie kann Zivilgesellschaft wirksam Einfluss auf...
Bursting the Brussels Bubble! Wie kann Zivilgesellschaft wirksam Einfluss auf...
 
re:publica 2016 #rpTEN: How the EU works
re:publica 2016 #rpTEN: How the EU worksre:publica 2016 #rpTEN: How the EU works
re:publica 2016 #rpTEN: How the EU works
 
re:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRLre:publica 2016 #rpTEN: CTRL
re:publica 2016 #rpTEN: CTRL
 
How the EU works and how to get involved
How the EU works and how to get involvedHow the EU works and how to get involved
How the EU works and how to get involved
 
#LOTE5: The EU and its people - a failure in democracy
#LOTE5: The EU and its people - a failure in democracy#LOTE5: The EU and its people - a failure in democracy
#LOTE5: The EU and its people - a failure in democracy
 
32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making
 
re:publica 2015: Internet censorship around Europe since ACTA
re:publica 2015: Internet censorship around Europe since ACTAre:publica 2015: Internet censorship around Europe since ACTA
re:publica 2015: Internet censorship around Europe since ACTA
 
Netzpolitik und digitale Grundrechte in der EU - Netzneutralität und Urheberr...
Netzpolitik und digitale Grundrechte in der EU - Netzneutralität und Urheberr...Netzpolitik und digitale Grundrechte in der EU - Netzneutralität und Urheberr...
Netzpolitik und digitale Grundrechte in der EU - Netzneutralität und Urheberr...
 
Guide pratique pour un Etat de surveillance parfait
Guide pratique pour un Etat de surveillance parfaitGuide pratique pour un Etat de surveillance parfait
Guide pratique pour un Etat de surveillance parfait
 
#rp13 - Praktische Anleitung für den fürsorglichen Überwachungsstaat
#rp13 - Praktische Anleitung für den fürsorglichen Überwachungsstaat#rp13 - Praktische Anleitung für den fürsorglichen Überwachungsstaat
#rp13 - Praktische Anleitung für den fürsorglichen Überwachungsstaat
 
Net neutrality - State of play in the EU
Net neutrality - State of play in the EUNet neutrality - State of play in the EU
Net neutrality - State of play in the EU
 
Activists guide to the EU
Activists guide to the EUActivists guide to the EU
Activists guide to the EU
 
ACTA campaigns in Europe
ACTA campaigns in EuropeACTA campaigns in Europe
ACTA campaigns in Europe
 

Dernier

2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Axel Bruns
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docxkfjstone13
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsPooja Nehwal
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 

Dernier (20)

2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 

12.NP: Anti-terrorism measures - Censoring the web, making us less secure

  • 1. We draw avery important conclusion here with a merely dark image behind it, so the text is white...Anti-terrorism measures Censoring the web, making us less secure @kirst3nf
  • 2. We draw avery important conclusion here with a merely dark image behind it, so the text is white... Populism Opportunism Ideology What now?
  • 4. I. Measures since 9/11 Year EU anti-terrorism measures 2001 EU terrorist “blacklists” 2001 Common Position on combating terrorism 2002 Council Framework Decision on Terrorism 2003 Regulation on the implementation of the common basic standards on aviation security 2004 EU Council declaration on combatting terrorism containing 57 specific measures, among them: 2004 Directive on the obligation of carrier to communicate passenger data [API Directive] 2004 Regulation on standards for security features and biometrics in passports and travel documents issued by Member States 2005 Prüm Convention (MS exchange data on DNA, fingerprints and vehicle registration of concerned persons and to cooperate against terrorism) 2005 Third anti-money laundering Directive 2006 Regulation on the establishment, operation and use of the second generation Schengen Information System (SIS II) 2006 Data Retention Directive [repealed] 2010 EU/USA Agreement: processing and transfer of Financial Messaging Data [SWIFT] for purposes of the Terrorist Finance Tracking Program [TFTP] 2012 EU/USA Agreement: use and transfer of passenger name records (PNR) to the United States DHS
  • 6. “Never waste a good crisis!” - Jan Jambon, Belgian Interior Minister quoting Winston Churchill, 28 September 2016
  • 7. EU 2015 - 2016 EU Internet Forum 2016 Directive on the use of Passenger Name Records (EU PNR) 2016 Europol Regulation 2016 Launch of European Counter Terrorism Centre (ECTC) 2016 Creation of a new portfolio on security: Commissioner Sir Julian King 201? Anti-Terrorism Directive
  • 16.
  • 17. We draw avery important conclusion here with a merely dark image behind it, so the text is white... Ideology: no evidence needed
  • 19. We draw avery important conclusion here with a merely dark image behind it, so the text is white... Ideology: no political debate needed
  • 20.
  • 21. We draw avery important conclusion here with a merely dark image behind it, so the text is white...Ideology: no nuanced approach needed
  • 22. Anti-Terrorism Directive Financing, travel, radicalisation and cybercyber
  • 23. Anti-Terrorism Directive 1. Vague definitions 2. Blocking & censorship 3. Weakening of encryption, interception 4. Attacks on information systems
  • 24. 1. Vague definitions “increasing misuse of the internet for terrorist purposes” “indirect provocation” “radicalisation of citizens” “glorification and justification of terrorism”
  • 25.
  • 26.
  • 27.
  • 28. We draw avery important conclusion here with a merely dark image behind it, so the text is white...Ideology: definitions not needed
  • 29. Recital (7b) An effective means of combatting terrorism on the internet is to remove illegal terrorist content at source. In that context, this Directive is without prejudice to voluntary action taken by the internet industry to prevent the misuse of its services or to any support for such action by Member States, such as detecting and flagging illegal content. Member States should take all necessary measures to remove or to block access to web pages publicly inciting others to commit terrorist offences. Where such measures are taken, they should be in line with transparent procedures and subject to adequate safeguards under the control of independent authorities. Member States should use their best endeavours to cooperate with third countries in seeking to secure the removal of such content from servers within their territory. However, when removal of illegal content at its source is not possible, Member States should be able to put in place measures to block access from Union territory to web pages identified as containing or disseminating terrorist content. Member States should consider legal action against internet and social media companies and service providers which deliberately refuse to comply with a legal order to delete illegal content extolling terrorism from their internet platforms after being duly notified about such content. Any refusal should be punishable by effective, proportionate and dissuasive sanctions. The right to judicial review should be guaranteed to the internet and social media companies and service providers. In that context, this Directive is without prejudice to voluntary action taken by the internet industry to prevent the misuse of its services or to any support for such action by Member States, such as detecting and flagging illegal content. 2. Blocking and censorship
  • 30. Recital (7b) An effective means of combatting terrorism on the internet is to remove illegal terrorist content at source. In that context, this Directive is without prejudice to voluntary action taken by the internet industry to prevent the misuse of its services or to any support for such action by Member States, such as detecting and flagging illegal content. Member States should take all necessary measures to remove or to block access to web pages publicly inciting others to commit terrorist offences. Where such measures are taken, they should be in line with transparent procedures and subject to adequate safeguards under the control of independent authorities. Member States should use their best endeavours to cooperate with third countries in seeking to secure the removal of such content from servers within their territory. However, when removal of illegal content at its source is not possible, Member States should be able to put in place measures to block access from Union territory to web pages identified as containing or disseminating terrorist content. Member States should consider legal action against internet and social media companies and service providers which deliberately refuse to comply with a legal order to delete illegal content extolling terrorism from their internet platforms after being duly notified about such content. Any refusal should be punishable by effective, proportionate and dissuasive sanctions. The right to judicial review should be guaranteed to the internet and social media companies and service providers. Member States should take all necessary measures to remove or to block access to web pages publicly inciting others to commit terrorist offences. 2. Blocking and censorship
  • 31. We draw avery important conclusion here with a merely dark image behind it, so the text is white... Ideology: no need for measures that actually work
  • 32. Recital (15d) The fact that terrorist organisations rely heavily upon various electronic tools, the internet and social media to communicate, promote, and incite terrorist acts, to recruit potential fighters, to collect funds, or to arrange for other support for their activities, creates challenges in investigations and prosecutions of terrorist offences. Member States should therefore cooperate with each other notably through Eurojust and Europol and with the Commission to ensure a coordinated approach in dealing with the gathering, sharing, and admissibility of electronic evidence. 3. Encryption & interception
  • 33. Recital (15d) The fact that terrorist organisations rely heavily upon various electronic tools, the internet and social media to communicate, promote, and incite terrorist acts, to recruit potential fighters, to collect funds, or to arrange for other support for their activities, creates challenges in investigations and prosecutions of terrorist offences. Member States should therefore cooperate with each other notably through Eurojust and Europol and with the Commission to ensure a coordinated approach in dealing with the gathering, sharing, and admissibility of electronic evidence. 3. Encryption & interception ensure a coordinated approach in dealing with the gathering, sharing, and admissibility of electronic evidence.
  • 34. Recital (15f) A Eurojust report of November 2014 notes that the growing sophistication and wider use of anonymisers, proxy servers, the Tor network, satellite links and foreign 3G networks create additional challenges to the gathering and analysis of electronic evidence, which are rendered even greater by the storage of data in the cloud. [not adopted] 3. Encryption & interception
  • 35.
  • 36. IV. What can I do?
  • 37. We draw avery important conclusion here with a merely dark image behind it, so the text is white... Ideology: real security not needed
  • 38. 3. Encryption & interception Recital (15a) To ensure the success of investigations [...], those responsible for investigating and prosecuting such offences should have the possibility to make use of effective investigative tools such as those which are used in combating organised crime or other serious crimes. Such tools should [...] include, for example, the search of any personal property, the interception of communications, covert surveillance including electronic surveillance, the taking and the fixing of audio recordings in private or public vehicles and places, and of visual images of persons in public vehicles and places, (…) and financial investigations(…).
  • 39. Recital (15a) To ensure the success of investigations and the prosecution of terrorist offences, offences related to a terrorist group or offences related to terrorist activities, those responsible for investigating and prosecuting such offences should have the possibility to make use of effective investigative tools such as those which are used in combating organised crime or other serious crimes. Such tools should, where appropriate, while taking into account the principle of proportionality and the nature and seriousness of the offences under investigation in accordance with national law, include, for example, the search of any personal property, the interception of communications, covert surveillance including electronic surveillance, the taking and the fixing of audio recordings in private or public vehicles and places, and of visual images of persons in public vehicles and places, (…) and financial investigations(…). 3. Encryption & interception include, for example, the search of any personal property, the interception of communications, covert surveillance including electronic surveillance, the taking and the fixing of audio recordings in private or public vehicles and places, and of visual images of persons in public vehicles and places,
  • 40. We draw avery important conclusion here with a merely dark image behind it, so the text is white... Ideology: privacy not needed
  • 41. 4. Attacks on information systems Article 3 - Terrorist offences ha) attacks against information systems as defined in Articles 3 to 7 of Directive 2013/40/EU of the European Parliament and of the Council; (i)seriously threatening to commit any of the acts listed in points (a) to (h)
  • 42. We draw avery important conclusion here with a merely dark image behind it, so the text is white... Ideology: real security not needed
  • 43. EU Council: + surveillance + interception EU Parliament: + web blocking + attacks against computer systems CONCLUSION
  • 45. We draw avery important conclusion here with a merely dark image behind it, so the text is white... What now?
  • 46. What now? 1. Blog, tweet etc. 2. Contact MEP Hohlmeier 3. Contact S&D (especially Germans) 4. Contact your permanent representation / Ministry
  • 47. We draw avery important conclusion here with a merely dark image behind it, so the text is white... Thanks! @kirst3nf kirsten.fiedler@edri.org @edri https://edri.org