The „decryption platform“ at Europol plans to switch to supercomputers soon. A working group is looking for ways to counter end-to-end encryption. By the end of the year, the Commission plans to present a study on how internet providers can break these secure connections and report criminal content to the relevant authorities.
For years, the European Commission has been calling for law enforcement authorities to have more access to encrypted communications. The Council, in which the Member States are organised, also adopted conclusions to this effect three years ago. In addition, the European Union’s “ Anti-Terrorism Co-ordinator“ Gilles de Kerchove regularly publishes papers calling for the elimination of secure communications. Most recently, Kerchove drew attention to the gaming community and its chats with end-to-end encryption. „European Commission starts new attack on end-to-end encryption“ weiterlesen
Following the example of the US Department of Defense, Europol should coordinate European security research. In October, the EU interior ministers had decided on an „Innovation Laboratory“ at the Police Agency. Due to potential confusion, the department will now be renamed.
Since 1984, the European Union has organised its civil security research in multi-annual framework programmes, the current programme is called „Horizon 2020“. Arms companies are involved in many of these projects; they are conducting research with institutes and authorities on drone tanks for border control, stopping „non-cooperative vehicles“ with electromagnetic pulses or observing cities and borders by satellite. International agreements enable the involvement of third countries, for example Israel’s largest drone manufacturer has been involved in numerous projects for decades. „Europol steers arms companies for security research“ weiterlesen
5G telephony makes communication more secure. Connections, subscriber and device identifiers are partly encrypted, also conventional IMSI catchers become useless. Providers could therefore be forced to install new surveillance technology.
With Multi-Access Edge Computing (MEC), the fifth mobile phone generation (5G) decomposes the transmission of telephone calls into individual stages and and encrypts them. Telecommunications providers no longer process the traffic centrally, but via various network edges. The metadata and content is only decrypted at these decentralized nodes.
That means that with 5G telephony, communication becomes much more secure. This poses a problem for police forces and secret services. „Surveillance of 5G: Governments plan to change laws“ weiterlesen
Heiner Busch and Matthias Monroy. Translation by Viktoria Langer
The formal process of developing and implementing EU counter-terrorism law and policy begins with the heads of government, in the European Council, setting out strategic guidelines. Thereafter, the Commission produces proposals for laws and policies that are discussed by the Council of the EU (made up of government officials) and the Parliament. However, this formal task-sharing between the institutions of the EU does not say much about the power relations and impulses surrounding counter-terrorism policy. „Who drives EU counter-terrorism? On the legislation of the European Union“ weiterlesen
A database set up jointly by Facebook, Microsoft, Twitter and YouTube has become operational. The prototype aims to identify “terrorist and radicalising” content automatically and to remove it from these platforms.
The prototype of a mechanism to prevent the publication of violent terrorist content on platforms such as Facebook and Twitter commenced operations last week. This was announced by European Commissioner for Migration, Home Affairs and Citizenship, Dimitris Avramopoulos, who met representatives from Facebook, Twitter and YouTube on Friday last week in order to discuss the progress made so far with regard to the “removal of terrorist content online”.
„Social media companies launch upload filter to combat “terrorism and extremism”“ weiterlesen