Abstract
Reacting to a series of terrorist attacks, the European Union has tasked Europol to establish an Internet Referral Unit (EU IRU) to counter terrorist propaganda.
The political statement entailed a clear commitment to fundamental rights including data protection. This paper analyses the present and future applicable legal bases and elaborates on challenges connected to the practical implementation of the EU IRU. It also explains why Europol is often referred to as “the most controlled police agency in the world”.
The paper concludes that it is possible to tackle terrorism propaganda online in a data protection compliant manner.
Similar content being viewed by others
Notes
http://www.bbc.com/news/world-europe-30759008, accessed on 21/01/2016.
http://www.bbc.com/news/world-europe-34818994, accessed on 21/01/2016.
http://www.bbc.com/news/world-europe-35869985, accessed on 17/06/2016.
http://www.reuters.com/article/us-germany-crime-munich-idUSKCN1021YZ, accessed on 02/08/16.
https://www.tagesschau.de/inland/amoklauf-muenchen-breivik-101.html, accessed on 02/08/16.
https://en.wikipedia.org/wiki/Video_Killed_the_Radio_Star, accessed on 08/01/16.
Korff/Brown [17], p. 119 ff.
Walker/Conway [30], pp. 156–175.
Cohen [5].
Edwards/Gribbon [8].
Mansfield-Devine [19], p. 2; http://www.computerweekly.com/news/4500249133/EU-launches-Internet-Referral-Unit-to-combat-online-extremism, accessed on 03/08/16; https://www.theguardian.com/world/2015/jun/21/europol-internet-unit-track-down-extremists-isis-social-media-propaganda, accessed on 03/08/16; http://www.scmagazineuk.com/europol-to-combat-terrorists-on-the-internet/article/423852/, accessed on 03/08/16; http://www.news.com.au/technology/online/europol-launches-new-police-unit-aimed-at-shutting-down-isis-social-media-accounts/news-story/c0b967d9c5c657873979fa9467bb93c5, accessed on 03/08/16.
Bebe [2].
Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.
Drewer/Ellermann [7], p. 200.
Also see https://www.europol.europa.eu/content/europol-internet-referral-unit-one-year; accessed on 02/08/16, which, however provides earlier figures.
Article 8 European Charter of Fundamental Rights, http://www.europarl.europa.eu/charter/pdf/text_en.pdf, accessed on 16/03/2016.
The right to privacy is enshrined in Article 12 of the Universal Declaration of Human Rights as well as in Article 8 of the European Convention of Human Rights, see https://secure.edps.europa.eu/EDPSWEB/edps/site/mySite/pid/84#privacy, accessed on 16/03/16.
Henderson [13]; https://shawnetuma.com/2015/01/10/do-you-have-a-reasonable-expectation-of-privacy-in-social-network-posts-no-here-is-why/; accessed on 02/08/16.
http://edition.cnn.com/2009/OPINION/10/28/cashmore.online.privacy/, accessed on 29/03/16.
http://www.theregister.co.uk/2008/04/26/infosec_show_roundup/, accessed on 07/04/16.
http://www.theregister.co.uk/2009/11/17/schneier_action_figure/, accessed on 07/04/16.
Schneier [25].
Article 10 of the European Convention of Human Rights, also see http://eeas.europa.eu/delegations/documents/eu_human_rights_guidelines_on_freedom_of_expression_online_and_offline_en.pdf, accessed on 16/03/16.
https://www.youtube.com/watch?v=r140gDllL9s, accessed on 11/03/16; for a comprehensive overview see Europol [9].
https://eu2015.lv/images/Kalendars/IeM/2015_01_29_jointstatement_JHA.pdf, accessed on 11/01/16.
Henderson [13], p. 234.
Henderson [13], p. 234.
https://iapp.org/news/a/fbi-gc-jim-baker-i-consider-myself-a-privacy-lawyer/, accessed on 07/04/16.
See Article 2a Directive 46/95/EC.
http://www.consilium.europa.eu/en/meetings/jha/2015/03/12-13/, accessed on 22/01/2016.
https://www.europol.europa.eu/st/DPO/#/information_gathering, chapter 4.2, accessed on 04/04/2016.
Drewer/Ellermann [7], p. 200.
See, for instance, for the situation in Germany Klesczewskiaff/Diethelm [15], pp. 737 ff.
https://en.wikipedia.org/wiki/A_maiore_ad_minus, accessed on 02/08/16.
https://support.google.com/youtube/answer/2803402?hl=en, accessed on 11/04/16.
See, for instance, Statewatch as quoted in http://www.telegraph.co.uk/news/worldnews/europe/11362300/Europol-to-be-given-new-internet-watchdog-powers.html, accessed on 11/04/16.
http://www.consilium.europa.eu/en/meetings/jha/2015/03/12-13/, accessed on 22/01/2016.
Social Network Analysis (SNA) is a scientific approach that was adopted as an innovative way to conduct crime analysis. Now computer-assisted SNA techniques (\(i.e\)., algorithms) can be employed by analysts to measure and visualize any type of network data (data which are relational and related to certain attributes). Operational analysts are able to deal with complex and large volumes of data to quickly identify structural patterns that otherwise would remain unnoticed. SNA should not be confused with social networking and the types of network data available on websites such as Facebook and Google+. SNA may also be performed on such data sets but analysis of these publicly available sources is not a constituent element of this analytical technique. For a critical view on SNA in the context of social networking sites see Schulzki-Haddouti [26], pp. 32 ff.; Kant/Busch [14], pp. 40 ff.
Drewer/Ellermann [7], p. 203.
https://www.europol.europa.eu/content/european-parliament-adopts-new-regulation-europol, accessed on 02/06/2016.
Regulation (EU) 2016/794 of the European Parliament and of the Council of 11 May 2016 on the European Union Agency for Law Enforcement Cooperation (Europol) and replacing and repealing Council Decisions 2009/371/JHA, 2009/934/JHA, 2009/935/JHA, 2009/936/JHA and 2009/968/JHA, OJL 135/107, 24/05/2016.
https://blog.twitter.com/2016/combating-violent-extremism, accessed on 08/06/2016.
Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.
Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.
http://jihadology.net/2015/07/06/guest-post-isis-and-the-hollywood-visual-style/, accessed on 09/06/2016; Bartlet [1]; also see http://www.mirror.co.uk/news/world-news/isis-try-lure-fighters-sick-8130091, accessed on 08/06/2016.
http://jihadology.net/2015/07/06/guest-post-isis-and-the-hollywood-visual-style/, accessed on 09/06/2016.
Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.
Bartlet [1]. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/, accessed on 06/06/2016.
http://data.consilium.europa.eu/doc/document/ST-7266-2015-INIT/en/pdf, accessed on 06/06/2016.
Cohen [5].
https://secure.edps.europa.eu/EDPSWEB/edps/lang/en/EDPS/Dataprotection/Glossary/pid/84, accessed on 10/02/16.
https://secure.edps.europa.eu/EDPSWEB/edps/lang/en/EDPS/Dataprotection/Glossary/pid/84, accessed on 10/02/16.
See Tanz [28].
Article 28 ECD.
Article 34 ECD.
https://www.europol.europa.eu/st/DPO/#/exercising_the_rules, accessed on 05/08/16; http://www.europoljsb.europa.eu/about.aspx, accessed on 05/08/2016.
For details on how already the entry into force of the Lisbon Treaty has further enhanced formal monitoring of Europol see Fletcher [11], pp. 38 ff.
Article 10(1) and (3) Protocol on Transitional Provisions Lisbon Treaty.
Fijnaut, quoted as per Groenleer [12] p. 282.
Articles 39, 42 ff. ER, in particular, Article 43(3)(f) ER which reads that the EDPS may impose a temporary or definitive ban on processing operations by Europol which are in breach of the provisions governing the processing of personal data.
Article 51(1) and (2) ER.
Article 51(2)(a) ER.
Article 51(2)(b) ER.
Article 51(3) and (4) ER.
Article 52 ER.
References
Bartlet, J.: How to beat the media Mujahideen, Demos Quarterly. http://quarterly.demos.co.uk/article/issue-5/how-to-beat-the-media-mujahideen/. Accessed on 05/08/16
Bebe, O.: Securitising the Internet: the making of an EU Internet referral unit at Europol. Leiden (2015). https://openaccess.leidenuniv.nl/bitstream/handle/1887/33646/Bebe-Olivia-s1429256-MIRD%20Thesis-2015.pdf?sequence=1. Accessed on 05/08/16
Berger, J.M., Perez, H.: The Islamic State’s diminishing returns on Twitter: how suspensions are limiting the social networks of English-speaking ISIS supporters. The Program on Extremism at George Washington University, Washington, DC (2016). https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/Berger_Occasional%20Paper.pdf. Accessed on 05/08/16
Bigo, D., et al.: The EU counter-terrorism policy responses to the attacks in Paris. CEPS paper in Liberty and Security in Europe, No. 81/2015, Brussels (2015)
Cohen, J.: Digital counterinsurgency: how to marginalize the Islamic State online. Foreign Affairs, Nov 1 (2015). Reading Level (Lexile):1390. http://find.galegroup.com.libezproxy.open.ac.uk/grnr/infomark.do?action=interpret&source=null&prodId=GRNR&userGroupName=tou&searchType=AdvancedSearchForm&docId=A439212871&type=retrieve&version=1.0&finalAuth=true. Accessed on 05/08/16
de Hert, P., Gutwirth, S.: Privacy, data protection and law enforcement. In: Claes, E., et al. (eds.) Privacy and the Criminal Law. Antwerpen, Oxford (2006)
Drewer, D., Ellermann, J.: May the (well-balanced) force be with us! The launch of the European Counter Terrorism Centre (ECTC). Comput. Law Secur. Rev. (2016). doi:10.1016/j.clsr.2016.02.003
Edwards, C., Gribbon, L.: Pathways to violent extremism in the digital era. RUSI J. 158(5), 40–47 (2013). doi:10.1080/03071847.2013.847714
Europol (ed.): DPO E-magazine. The Hague (2016). https://www.europol.europa.eu/st/DPO/#/cover. Accessed on 05/08/2016
Europol (ed.): European Union Terrorism Situation and Trend Report 2015, Den Haag (2015)
Fletcher, M.: EU criminal justice beyond Lisbon. In: Eckes, C., Konstadinides, T. (eds.) Crime within the Area of Freedom, Security and Justice. Cambridge (2011)
Groenleer, M.: The Autonomy of European Union Agencies. Delft (2009)
Henderson, S.E.: Expectations of privacy in social media, p. 229 ff. In: Mississippi College Law Review, seq. 4, 25/10/12, Oklahoma (2012). http://ssrn.com/abstract=2018425. Accessed on 05/08/16
Kant, M., Busch, H.: Der Staat surft mit. In: Bürgerrechte & Polizei/CILIP (1/2011). Berlin (2011)
Klesczewskiaff, D.: Z. gesamte Strafrechtswissenschaft 123(4), 737–766 (2012). doi:10.1515/zstw-2011-0737
Klitou, D.: Privacy-Invading Technologies and Privacy-by-design: Safeguarding Privacy, Liberty and Security in the 21st Century. Information Technology and Law Series, vol. 25, pp. 22–25. Springer, Berlin (2014)
Korff, D., Brown, I.: Terrorism and the proportionality of Internet surveillance. Eur. J. Criminol. 6(2), 119–134 (2009). doi:10.1177/1477370808100541
Levi, M., Wall, D.S.: Technology, security, and privacy in the post-9/11 European information society. J. Law Soc. 31(2), 194–220 (2004)
Mansfield-Devine, S.: Europol sets sights on IS. Netw. Secur. 2015(7), 2 (2015). doi:10.1016/S1353-4858(15)30054-4
Matthew, R., Shambaugh, G.: The Pendulum effect: explaining shifts in the democratic response to terrorism. Anal. Soc. Issues Public Policy 5(1), 223 (2005)
Peissl, W.: Surveillance and security: a dodgy relationship. J. Conting. Crisis Manag. 11(1), 19–24 (2003)
Reynolds, T.: Ethical and legal issues surrounding academic research into online radicalisation: a UK experience. Crit. Stud. Terrorism 5(3), 499–513 (2012). doi:10.1080/17539153.2012.723447
Rosen, J.: The eroded self. N.Y. Times, April 30, 2000. http://www.nytimes.com/library/magazine/home/20000430mag-internetprivacy.html. Accessed on 05/04/16
Rosendaal, A., Kert, M., Lyle, A., Gasper, U.: Data Protection Law Compliance for Cybercrime and Cyberterrorism Research. In: Akar, B., Brewster, B. (eds.) Combatting Cybercrime and Cyberterrorism. Switzerland, p. 82 (2016). doi:10.1007/978-3-319-38930-1
Schneier, B.: The eternal value of privacy. wired.com, May 18, 2006. http://archive.wired.com/politics/security/commentary/securitymatters/2006/05/70886. Accessed on 05/04/16
Schulzki-Haddouti, C.: Gläserne soziale Netzwerke. In: Bürgerrechte & Polizei/CILIP (1/2011), p. 32. Berlin (2011)
Shaheen, J.: Network of terror: how ISIS uses adaptive social networks to spread its message NATO StratCom (2015). www.stratcomcoe.org/download/file/fid/3312. Accessed on 06/06/16
Tanz, J.: The end of code. http://www.wired.com/2016/05/the-end-of-code/. Accessed on 16/06/2016
Tzanou, M.: The war against terror and transatlantic information sharing: spill-overs of privacy or spill-overs of sovereignty? Utrecht J. Int. Eur. Law 31, 94–95 (2015)
Walker, C., Conway, M.: Online terrorism and online laws. Dyn. Asymmetric Confl. 8(2), 156–175 (2015). doi:10.1080/17467586.2015.1065078
Shaa, R.: Law enforcement and data privacy: a forward-looking approach. Yale Law J. 125(2), 543 (2015)
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is based on a minor thesis submitted in part fulfilment of the degree of M.Sc. in Forensic Computing and Cyber Crime Investigation at the School of Computer Science and Informatics at University College of Dublin under the supervision of Dr. Nhien An Le Khac.
The opinions expressed by the author in this article are personal ones and do not necessarily represent those of the organisation he works for.
Rights and permissions
About this article
Cite this article
Ellermann, J. Terror won’t kill the privacy star – tackling terrorism propaganda online in a data protection compliant manner. ERA Forum 17, 555–582 (2016). https://doi.org/10.1007/s12027-016-0446-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12027-016-0446-z