Skip to main content

Advertisement

Log in

Terror won’t kill the privacy star – tackling terrorism propaganda online in a data protection compliant manner

  • Article
  • Published:
ERA Forum Aims and scope

Abstract

Reacting to a series of terrorist attacks, the European Union has tasked Europol to establish an Internet Referral Unit (EU IRU) to counter terrorist propaganda.

The political statement entailed a clear commitment to fundamental rights including data protection. This paper analyses the present and future applicable legal bases and elaborates on challenges connected to the practical implementation of the EU IRU. It also explains why Europol is often referred to as “the most controlled police agency in the world”.

The paper concludes that it is possible to tackle terrorism propaganda online in a data protection compliant manner.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. See Europol [10], pp. 1 ff.; Drewer/Ellermann [7], pp. 195 f.

  2. http://www.bbc.com/news/world-europe-30759008, accessed on 21/01/2016.

  3. http://www.bbc.com/news/world-europe-34818994, accessed on 21/01/2016.

  4. http://www.nytimes.com/2015/11/15/world/europe/isis-claims-responsibility-for-paris-attacks-calling-them-miracles.html?_r=0, accessed on 21/01/2016.

  5. http://www.bbc.com/news/world-europe-35869985, accessed on 17/06/2016.

  6. https://www.theguardian.com/world/live/2016/jul/14/nice-bastille-day-france-attack-promenade-des-anglais-vehicle, accessed on 02/08/16.

  7. http://www.reuters.com/article/us-germany-crime-munich-idUSKCN1021YZ, accessed on 02/08/16.

  8. https://www.tagesschau.de/inland/amoklauf-muenchen-breivik-101.html, accessed on 02/08/16.

  9. https://www.theguardian.com/world/2016/jul/26/men-hostages-french-church-police-normandy-saint-etienne-du-rouvray, accessed on 02/08/16.

  10. See, for instance, Bigo et. al. [4], p. 1 ff.; Matthew/Shambaugh [20], pp. 223 ff.; Levi/Wall [18], pp. 196–205; Peissl [21], pp. 19 ff.

  11. https://en.wikipedia.org/wiki/Video_Killed_the_Radio_Star, accessed on 08/01/16.

  12. Korff/Brown [17], p. 119 ff.

  13. Walker/Conway [30], pp. 156–175.

  14. Cohen [5].

  15. Edwards/Gribbon [8].

  16. Reynolds [22], pp. 499–513; Rosendaal/Kert/Lyle/Gasper [24], pp. 81 ff.

  17. Mansfield-Devine [19], p. 2; http://www.computerweekly.com/news/4500249133/EU-launches-Internet-Referral-Unit-to-combat-online-extremism, accessed on 03/08/16; https://www.theguardian.com/world/2015/jun/21/europol-internet-unit-track-down-extremists-isis-social-media-propaganda, accessed on 03/08/16; http://www.scmagazineuk.com/europol-to-combat-terrorists-on-the-internet/article/423852/, accessed on 03/08/16; http://www.news.com.au/technology/online/europol-launches-new-police-unit-aimed-at-shutting-down-isis-social-media-accounts/news-story/c0b967d9c5c657873979fa9467bb93c5, accessed on 03/08/16.

  18. Bebe [2].

  19. https://www.euractiv.com/section/justice-home-affairs/news/europol-reform-but-who-polices-the-police/, accessed on 16/03/16.

  20. https://www.accessnow.org/europols-internet-referral-unit-risks-harming-rights-isolating-extremists/, accessed on 02/08/16; http://arstechnica.co.uk/tech-policy/2016/07/europol-iru-extremist-content-censorship-policing/, accessed on 02/08/16.

  21. http://www.telegraph.co.uk/news/uknews/defence/11208796/How-social-media-is-helping-Islamic-State-to-spread-its-poison.html, accessed on 22/01/2016.

  22. Bebe [2]; also see Korff/Brown [17], p. 121.

  23. Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.

  24. Drewer/Ellermann [7], p. 200.

  25. https://www.europol.europa.eu/content/europol%E2%80%99s-internet-referral-unit-combat-terrorist-and-violent-extremist-propaganda, accessed on 22/01/2016; http://www.bankinfosecurity.com/europol-details-online-jihadist-hunt-a-8369/op-1, accessed on 21/01/2016.

  26. Also see https://www.europol.europa.eu/content/europol-internet-referral-unit-one-year; accessed on 02/08/16, which, however provides earlier figures.

  27. Korff/Brown [17], p. 120; also see Henderson [13], pp. 229 ff.; Rosendaal/Kert/Lyle/Gasper [24], pp. 82 f.

  28. Article 8 European Charter of Fundamental Rights, http://www.europarl.europa.eu/charter/pdf/text_en.pdf, accessed on 16/03/2016.

  29. The right to privacy is enshrined in Article 12 of the Universal Declaration of Human Rights as well as in Article 8 of the European Convention of Human Rights, see https://secure.edps.europa.eu/EDPSWEB/edps/site/mySite/pid/84#privacy, accessed on 16/03/16.

  30. Henderson [13]; https://shawnetuma.com/2015/01/10/do-you-have-a-reasonable-expectation-of-privacy-in-social-network-posts-no-here-is-why/; accessed on 02/08/16.

  31. http://edition.cnn.com/2009/OPINION/10/28/cashmore.online.privacy/, accessed on 29/03/16.

  32. Quoted as per Rosen [23]; also see Henderson [13], p. 229.

  33. http://www.theregister.co.uk/2008/04/26/infosec_show_roundup/, accessed on 07/04/16.

  34. http://www.theregister.co.uk/2009/11/17/schneier_action_figure/, accessed on 07/04/16.

  35. Schneier [25].

  36. Article 10 of the European Convention of Human Rights, also see http://eeas.europa.eu/delegations/documents/eu_human_rights_guidelines_on_freedom_of_expression_online_and_offline_en.pdf, accessed on 16/03/16.

  37. de Hert/ Gutwirth [6], pp. 61 ff.; see for the impact of the Snowden revelations on US law enforcement Shaa [31], pp. 543 ff.

  38. https://www.youtube.com/watch?v=r140gDllL9s, accessed on 11/03/16; for a comprehensive overview see Europol [9].

  39. Klitou/Demetrius [16], pp. 22–25; see also Tzanou [29], pp. 94–95.

  40. https://eu2015.lv/images/Kalendars/IeM/2015_01_29_jointstatement_JHA.pdf, accessed on 11/01/16.

  41. http://www.consilium.europa.eu/en/press/press-releases/2015/02/150212-european-council-statement-fight-against-terrorism/, accessed on 12/01/16.

  42. Henderson [13], p. 234.

  43. Henderson [13], p. 234.

  44. https://iapp.org/news/a/fbi-gc-jim-baker-i-consider-myself-a-privacy-lawyer/, accessed on 07/04/16.

  45. See Article 2a Directive 46/95/EC.

  46. http://www.consilium.europa.eu/en/meetings/jha/2015/03/12-13/, accessed on 22/01/2016.

  47. https://www.europol.europa.eu/st/DPO/#/information_gathering, chapter 4.2, accessed on 04/04/2016.

  48. Drewer/Ellermann [7], p. 202. Also see Europol [9].

  49. Drewer/Ellermann [7], p. 200.

  50. See, for instance, for the situation in Germany Klesczewskiaff/Diethelm [15], pp. 737 ff.

  51. https://en.wikipedia.org/wiki/A_maiore_ad_minus, accessed on 02/08/16.

  52. https://support.google.com/youtube/answer/2803402?hl=en, accessed on 11/04/16.

  53. https://www.youtube.com/yt/policyandsafety/en/communityguidelines.html#communityguidelines-line-crossing, accessed on 11/04/16.

  54. See, for instance, Statewatch as quoted in http://www.telegraph.co.uk/news/worldnews/europe/11362300/Europol-to-be-given-new-internet-watchdog-powers.html, accessed on 11/04/16.

  55. http://www.consilium.europa.eu/en/meetings/jha/2015/03/12-13/, accessed on 22/01/2016.

  56. Social Network Analysis (SNA) is a scientific approach that was adopted as an innovative way to conduct crime analysis. Now computer-assisted SNA techniques (\(i.e\)., algorithms) can be employed by analysts to measure and visualize any type of network data (data which are relational and related to certain attributes). Operational analysts are able to deal with complex and large volumes of data to quickly identify structural patterns that otherwise would remain unnoticed. SNA should not be confused with social networking and the types of network data available on websites such as Facebook and Google+. SNA may also be performed on such data sets but analysis of these publicly available sources is not a constituent element of this analytical technique. For a critical view on SNA in the context of social networking sites see Schulzki-Haddouti [26], pp. 32 ff.; Kant/Busch [14], pp. 40 ff.

  57. Drewer/Ellermann [7], p. 203.

  58. https://www.europol.europa.eu/content/european-parliament-adopts-new-regulation-europol, accessed on 02/06/2016.

  59. Regulation (EU) 2016/794 of the European Parliament and of the Council of 11 May 2016 on the European Union Agency for Law Enforcement Cooperation (Europol) and replacing and repealing Council Decisions 2009/371/JHA, 2009/934/JHA, 2009/935/JHA, 2009/936/JHA and 2009/968/JHA, OJL 135/107, 24/05/2016.

  60. https://blog.twitter.com/2016/combating-violent-extremism, accessed on 08/06/2016.

  61. http://www.nytimes.com/2015/02/17/world/middleeast/us-intensifies-effort-to-blunt-isis-message.html?_r=2, accessed on 06/06/2016.

  62. Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.

  63. Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.

  64. http://jihadology.net/2015/07/06/guest-post-isis-and-the-hollywood-visual-style/, accessed on 09/06/2016; Bartlet [1]; also see http://www.mirror.co.uk/news/world-news/isis-try-lure-fighters-sick-8130091, accessed on 08/06/2016.

  65. http://jihadology.net/2015/07/06/guest-post-isis-and-the-hollywood-visual-style/, accessed on 09/06/2016.

  66. Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.

  67. Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.

  68. http://data.consilium.europa.eu/doc/document/ST-7266-2015-INIT/en/pdf, accessed on 06/06/2016.

  69. Berger/Perez [3]; Shaheen [27].

  70. Cohen [5].

  71. https://secure.edps.europa.eu/EDPSWEB/edps/lang/en/EDPS/Dataprotection/Glossary/pid/84, accessed on 10/02/16.

  72. https://secure.edps.europa.eu/EDPSWEB/edps/lang/en/EDPS/Dataprotection/Glossary/pid/84, accessed on 10/02/16.

  73. See Tanz [28].

  74. Article 28 ECD.

  75. Article 34 ECD.

  76. https://www.europol.europa.eu/st/DPO/#/exercising_the_rules, accessed on 05/08/16; http://www.europoljsb.europa.eu/about.aspx, accessed on 05/08/2016.

  77. For details on how already the entry into force of the Lisbon Treaty has further enhanced formal monitoring of Europol see Fletcher [11], pp. 38 ff.

  78. Article 10(1) and (3) Protocol on Transitional Provisions Lisbon Treaty.

  79. Fijnaut, quoted as per Groenleer [12] p. 282.

  80. Articles 39, 42 ff. ER, in particular, Article 43(3)(f) ER which reads that the EDPS may impose a temporary or definitive ban on processing operations by Europol which are in breach of the provisions governing the processing of personal data.

  81. Article 51(1) and (2) ER.

  82. Article 51(2)(a) ER.

  83. Article 51(2)(b) ER.

  84. Article 51(3) and (4) ER.

  85. Article 52 ER.

References

  1. Bartlet, J.: How to beat the media Mujahideen, Demos Quarterly. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/. Accessed on 05/08/16

  2. Bebe, O.: Securitising the Internet: the making of an EU Internet referral unit at Europol. Leiden (2015). https://openaccess.leidenuniv.nl/bitstream/handle/1887/33646/Bebe-Olivia-s1429256-MIRD%20Thesis-2015.pdf?sequence=1. Accessed on 05/08/16

  3. Berger, J.M., Perez, H.: The Islamic State’s diminishing returns on Twitter: how suspensions are limiting the social networks of English-speaking ISIS supporters. The Program on Extremism at George Washington University, Washington, DC (2016). https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/Berger_Occasional%20Paper.pdf. Accessed on 05/08/16

  4. Bigo, D., et al.: The EU counter-terrorism policy responses to the attacks in Paris. CEPS paper in Liberty and Security in Europe, No. 81/2015, Brussels (2015)

  5. Cohen, J.: Digital counterinsurgency: how to marginalize the Islamic State online. Foreign Affairs, Nov 1 (2015). Reading Level (Lexile):1390. http://find.galegroup.com.libezproxy.open.ac.uk/grnr/infomark.do?action=interpret&source=null&prodId=GRNR&userGroupName=tou&searchType=AdvancedSearchForm&docId=A439212871&type=retrieve&version=1.0&finalAuth=true. Accessed on 05/08/16

  6. de Hert, P., Gutwirth, S.: Privacy, data protection and law enforcement. In: Claes, E., et al. (eds.) Privacy and the Criminal Law. Antwerpen, Oxford (2006)

    Google Scholar 

  7. Drewer, D., Ellermann, J.: May the (well-balanced) force be with us! The launch of the European Counter Terrorism Centre (ECTC). Comput. Law Secur. Rev. (2016). doi:10.1016/j.clsr.2016.02.003

    Google Scholar 

  8. Edwards, C., Gribbon, L.: Pathways to violent extremism in the digital era. RUSI J. 158(5), 40–47 (2013). doi:10.1080/03071847.2013.847714

    Article  Google Scholar 

  9. Europol (ed.): DPO E-magazine. The Hague (2016). https://www.europol.europa.eu/st/DPO/#/cover. Accessed on 05/08/2016

  10. Europol (ed.): European Union Terrorism Situation and Trend Report 2015, Den Haag (2015)

  11. Fletcher, M.: EU criminal justice beyond Lisbon. In: Eckes, C., Konstadinides, T. (eds.) Crime within the Area of Freedom, Security and Justice. Cambridge (2011)

    Google Scholar 

  12. Groenleer, M.: The Autonomy of European Union Agencies. Delft (2009)

  13. Henderson, S.E.: Expectations of privacy in social media, p. 229 ff. In: Mississippi College Law Review, seq. 4, 25/10/12, Oklahoma (2012). http://ssrn.com/abstract=2018425. Accessed on 05/08/16

  14. Kant, M., Busch, H.: Der Staat surft mit. In: Bürgerrechte & Polizei/CILIP (1/2011). Berlin (2011)

  15. Klesczewskiaff, D.: Z. gesamte Strafrechtswissenschaft 123(4), 737–766 (2012). doi:10.1515/zstw-2011-0737

    Google Scholar 

  16. Klitou, D.: Privacy-Invading Technologies and Privacy-by-design: Safeguarding Privacy, Liberty and Security in the 21st Century. Information Technology and Law Series, vol. 25, pp. 22–25. Springer, Berlin (2014)

    Google Scholar 

  17. Korff, D., Brown, I.: Terrorism and the proportionality of Internet surveillance. Eur. J. Criminol. 6(2), 119–134 (2009). doi:10.1177/1477370808100541

    Article  Google Scholar 

  18. Levi, M., Wall, D.S.: Technology, security, and privacy in the post-9/11 European information society. J. Law Soc. 31(2), 194–220 (2004)

    Article  Google Scholar 

  19. Mansfield-Devine, S.: Europol sets sights on IS. Netw. Secur. 2015(7), 2 (2015). doi:10.1016/S1353-4858(15)30054-4

    Google Scholar 

  20. Matthew, R., Shambaugh, G.: The Pendulum effect: explaining shifts in the democratic response to terrorism. Anal. Soc. Issues Public Policy 5(1), 223 (2005)

    Article  Google Scholar 

  21. Peissl, W.: Surveillance and security: a dodgy relationship. J. Conting. Crisis Manag. 11(1), 19–24 (2003)

    Article  Google Scholar 

  22. Reynolds, T.: Ethical and legal issues surrounding academic research into online radicalisation: a UK experience. Crit. Stud. Terrorism 5(3), 499–513 (2012). doi:10.1080/17539153.2012.723447

    Article  Google Scholar 

  23. Rosen, J.: The eroded self. N.Y. Times, April 30, 2000. http://www.nytimes.com/library/magazine/home/20000430mag-internetprivacy.html. Accessed on 05/04/16

  24. Rosendaal, A., Kert, M., Lyle, A., Gasper, U.: Data Protection Law Compliance for Cybercrime and Cyberterrorism Research. In: Akar, B., Brewster, B. (eds.) Combatting Cybercrime and Cyberterrorism. Switzerland, p. 82 (2016). doi:10.1007/978-3-319-38930-1

    Google Scholar 

  25. Schneier, B.: The eternal value of privacy. wired.com, May 18, 2006. http://archive.wired.com/politics/security/commentary/securitymatters/2006/05/70886. Accessed on 05/04/16

  26. Schulzki-Haddouti, C.: Gläserne soziale Netzwerke. In: Bürgerrechte & Polizei/CILIP (1/2011), p. 32. Berlin (2011)

  27. Shaheen, J.: Network of terror: how ISIS uses adaptive social networks to spread its message NATO StratCom (2015). www.stratcomcoe.org/download/file/fid/3312. Accessed on 06/06/16

    Google Scholar 

  28. Tanz, J.: The end of code. http://www.wired.com/2016/05/the-end-of-code/. Accessed on 16/06/2016

  29. Tzanou, M.: The war against terror and transatlantic information sharing: spill-overs of privacy or spill-overs of sovereignty? Utrecht J. Int. Eur. Law 31, 94–95 (2015)

    Article  Google Scholar 

  30. Walker, C., Conway, M.: Online terrorism and online laws. Dyn. Asymmetric Confl. 8(2), 156–175 (2015). doi:10.1080/17467586.2015.1065078

    Article  Google Scholar 

  31. Shaa, R.: Law enforcement and data privacy: a forward-looking approach. Yale Law J. 125(2), 543 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan Ellermann.

Additional information

This article is based on a minor thesis submitted in part fulfilment of the degree of M.Sc. in Forensic Computing and Cyber Crime Investigation at the School of Computer Science and Informatics at University College of Dublin under the supervision of Dr. Nhien An Le Khac.

The opinions expressed by the author in this article are personal ones and do not necessarily represent those of the organisation he works for.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ellermann, J. Terror won’t kill the privacy star – tackling terrorism propaganda online in a data protection compliant manner. ERA Forum 17, 555–582 (2016). https://doi.org/10.1007/s12027-016-0446-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12027-016-0446-z

Keywords

Navigation