From cybersecurity to terrorism – are we all under surveillance? – PL 03a 2016: Difference between revisions

From EuroDIG Wiki
Jump to navigation Jump to search
No edit summary
(43 intermediate revisions by 7 users not shown)
Line 3: Line 3:
'''Please use your own words to describe this session. You may use external references, websites or publications as a source of information or inspiration, if you decide to quote them, please clearly specify the source.'''
'''Please use your own words to describe this session. You may use external references, websites or publications as a source of information or inspiration, if you decide to quote them, please clearly specify the source.'''
----
----
''To follow the current discussion on this topic, see [http://eurodigwiki.org/wiki/Talk:Follow-up_plenary_3:_Surveillance,_terrorism,_anonymity the discussion tab] on the upper left side of this page''
''To follow the current discussion on this topic, see [http://eurodigwiki.org/wiki/Talk:PL_3a:_From_cybersecurity_to_terrorism:_Are_we_all_under_surveillance%3F the discussion tab] on the upper left side of this page''
 
'''Final title of the session: please send the final title until 4 April to office@eurodig.org.''' Do not edit the title on your at the wiki. The link to your session may otherwise disappear.


== Session teaser ==
== Session teaser ==
'''Until April 4th 2016.''' One sentence description
This session will be an interactive discussion with short interventions from speakers on the stage and in the audience on the topics of government surveillance, cybersecurity, terrorism and anonymity.


== Session description ==  
== Session description ==  
'''Until 30 April 2016.''' Always use your own words to describe your session. If you decide to quote the words of an external source, give them the due respect and acknowledgement by specifying the source.
 
Recent cyber and terrorist attacks have led several European governments to consider and enact new online surveillance laws, e.g. in France and the UK. This will be a solutions-focused session seeking to find multi-stakeholder answers to key questions such as:  What are the features of these new laws and are they legal?  Do they hinder terrorism?  What is the impact on anonymity and privacy?  What actions do tech companies take to increase trusts, e.g. through encryption and transparency?  What is the right balance between fighting terrorism and upholding online rights?  How can we bring a human rights framing to security and surveillance discussions and policy-making?


== Keywords ==
== Keywords ==
'''Until April 4th 2016.''' They will be used as hash tags for easy searching on the wiki
Surveillance, terrorism, anonymity


== Format ==  
== Format ==  
'''Until 30 April 2016.''' Please try new interactive formats out. EuroDIG is about dialogue not about statements.
Moving from statements to Q&A. A very brief “state of play” comments for each of the questions outlined from the speakers, followed by suggestions or thoughts from the speakers on how to address the challenges/how to change the discourse/how to shift the policy discussion, engaging also the audience in the discussion.


== Further reading ==  
== Further reading ==  
'''Until 30 April 2016.''' Links to relevant websites, declarations, books, documents. Please note we cannot offer web space, only links to external resources are possible.
*[https://www.freedomonlinecoalition.com/wp-content/uploads/2014/04/FOC-WG1-Narrative-Final-28-April-2016.pdf FOC WG1 - An Internet free and secure: a human rights approach to cybersecurity policy-making]
*[https://www.freedomonlinecoalition.com/wp-content/uploads/2014/04/FOC-WG1-Recommendations-Final-21Sept-2015.pdf FOC WG1 - An Internet free and secure: recommendations for human rights based approaches to cybersecurity]


== People ==  
== People ==  
Name, institution, country of residence
*'''Focal Point''': Mattias Bjärnemalm, Advisor on Internet Policy, European Parliament
*'''Focal Point'''  
*'''Moderator''': Jens-Henrik Jeppesen (Director, CDT)
Focal points take over the responsibility and lead of the session organization. Focal points are kindly requested to observe [http://www.eurodig.org/get-involved/organising-a-session/#jfmulticontent_c2865-1 EuroDIG's session principles]. Focal points work in close contact and cooperation with the programme director.
*'''Key participants''':
*'''Key participants'''
**Jan Kleijssen, Director of Information Society and Action against Crime, Council of Europe
'''Until 15 May 2016.'''  
**Sacha van Geffen, Managing Director, Greenhost.net
Key participants (workshop) are experts willing to provide their knowledge during a session – not necessarily on stage. Key participants should contribute to the session planning process and keep statements short and punchy during the session. Panellist (plenary) will be selected and assigned by the org team, ensuring a stakeholder balanced dialogue also considering gender and geographical balance.
**Gregory Mounier, Europol
Panellists should contribute to the session planning process and keep statements short and punchy during the session.
**Valentina Pellizzer, OneWorld Platform
Please provide short CV’s of the participants involved in your session at the Wiki or link to another source.
** Harry Halpin, W3C
*'''Moderator'''
**Christian Borggreen, Director CCIA Europe
'''Until 15 May 2016.'''
*'''Remote moderator''': Farzaneh Badiei
The moderator is the facilitator of the session at the event. Moderators are responsible for including the audience and encouraging a lively interaction among all session attendants. Please make sure the moderator takes a neutral role and can balance between all speakers.
*Please provide short CV of the moderator of your session at the Wiki or link to another source.
*'''Remote moderator'''
'''Until 15 May 2016.'''
The remote moderator is in charge of facilitating participation via digital channels such as WebEx and social medial (Twitter, facebook). Remote moderators monitor and moderate the social media channels and the participants via WebEX and forward questions to the session moderator.
Please contact the EuroDIG secretariat if you need help to find a remote moderator.
*'''Org team'''  
*'''Org team'''  
Organising team is a group of people shaping the session. Every interested individual can become a member of an organising team (org team).
**Desara Dushi, PhD Candidate in Law, Science and Technology (LAST-JD), University of Bologna and University of Turin
*'''Reporter'''
**Christian Borggreen
'''Until 15 May 2016.'''
**Sophie Kwasny
The reporter takes notes during the session and formulates 3 (max. 5) bullet points at the end of each session that:  
**Rudi Vansnick
#are summarised on a slide and  presented to the audience at the end of each session
**Lianna Galstyan
#relate to the particular session and to European Internet governance policy
*'''Reporter''': Valentina Pavel
#are forward looking and propose goals and activities that can be initiated after EuroDIG (recommendations)
#are in (rough) consensus with the audience
#are to be submitted to the secretariat within 48 hours after the session took place
Please provide short CV of the reporter of your session at the Wiki or link to another source and contact the EuroDIG secretariat if you need help to find a reporter.


== Current discussion ==
== Current discussion ==
See [http://eurodigwiki.org/wiki/Talk:Follow-up_plenary_3:_Surveillance,_terrorism,_anonymity the discussion tab] on the upper left side of this page.
See [http://eurodigwiki.org/wiki/Talk:PL_3a:_From_cybersecurity_to_terrorism:_Are_we_all_under_surveillance%3F the discussion tab] on the upper left side of this page.


== Conference call. Schedules and minutes ==
== Conference call. Schedules and minutes ==
Line 61: Line 51:


== Mailing list ==  
== Mailing list ==  
Contact:  
Contact: pl3a@eurodig.org


== Remote participation ==
== Video record ==
[https://youtu.be/RgeHgJQlSag See the video record in our youtube channel]


== Transcript ==
[[Transcript: From cybersecurity to terrorism - are we all under surveillance?]]


== Final report ==   
== Messages ==   
Deadline 2016
* Lowering privacy and data protection standards is not the solution for combating terrorism.
* Gathering of data should not be confused with requests for information when investigating crimes committed in cyberspace.
* Transparency, privacy, security and encryption are essential for Internet users and more and more focus should be awarded to ensuring them.
* National exceptions should be eliminated and human rights should be enforced. It is time to solidify frameworks both from a technical as well as political point of view.
* The lack of harmonization for legal and lawful investigations is one of the biggest problems of the law enforcement community.
* Authorities have a large appreciation of who is a terrorist, therefore surveillance measures are sometimes exceeding the proportionality, adequacy and  predictability principles.
* The cybersecurity definition should include and focus both on the end user as well as on the technical community and the justice department. Cybersecurity comes with protecting the end user and with secure systems, not against them.
* It is crucial to protect a free and open Internet.
* All legal principles apply to surveillance measures, therefore the rule of law is incremental applied to targeted surveillance. More training and skills are needed for correct information management of both intelligence agencies and police.


== Session twitter hashtag ==   
== Session twitter hashtag ==   
Hashtag:
Hashtag: #eurodig16


[[Category:Sessions]][[Category:Sessions 2016]]
[[Category:Sessions]][[Category:Sessions 2016]][[Category:Human rights 2016]][[Category:Human rights]]

Revision as of 21:43, 31 August 2016


Please use your own words to describe this session. You may use external references, websites or publications as a source of information or inspiration, if you decide to quote them, please clearly specify the source.


To follow the current discussion on this topic, see the discussion tab on the upper left side of this page

Session teaser

This session will be an interactive discussion with short interventions from speakers on the stage and in the audience on the topics of government surveillance, cybersecurity, terrorism and anonymity.

Session description

Recent cyber and terrorist attacks have led several European governments to consider and enact new online surveillance laws, e.g. in France and the UK. This will be a solutions-focused session seeking to find multi-stakeholder answers to key questions such as: What are the features of these new laws and are they legal? Do they hinder terrorism? What is the impact on anonymity and privacy? What actions do tech companies take to increase trusts, e.g. through encryption and transparency? What is the right balance between fighting terrorism and upholding online rights? How can we bring a human rights framing to security and surveillance discussions and policy-making?

Keywords

Surveillance, terrorism, anonymity

Format

Moving from statements to Q&A. A very brief “state of play” comments for each of the questions outlined from the speakers, followed by suggestions or thoughts from the speakers on how to address the challenges/how to change the discourse/how to shift the policy discussion, engaging also the audience in the discussion.

Further reading

People

  • Focal Point: Mattias Bjärnemalm, Advisor on Internet Policy, European Parliament
  • Moderator: Jens-Henrik Jeppesen (Director, CDT)
  • Key participants:
    • Jan Kleijssen, Director of Information Society and Action against Crime, Council of Europe
    • Sacha van Geffen, Managing Director, Greenhost.net
    • Gregory Mounier, Europol
    • Valentina Pellizzer, OneWorld Platform
    • Harry Halpin, W3C
    • Christian Borggreen, Director CCIA Europe
  • Remote moderator: Farzaneh Badiei
  • Org team
    • Desara Dushi, PhD Candidate in Law, Science and Technology (LAST-JD), University of Bologna and University of Turin
    • Christian Borggreen
    • Sophie Kwasny
    • Rudi Vansnick
    • Lianna Galstyan
  • Reporter: Valentina Pavel

Current discussion

See the discussion tab on the upper left side of this page.

Conference call. Schedules and minutes

  • dates for virtual meetings or coordination calls
  • short summary of calls or email exchange
  • be as open and transparent as possible in order to allow others to get involved and contact you
  • use the wiki not only as the place to publish results but also to summarize and publish the discussion process

Mailing list

Contact: pl3a@eurodig.org

Video record

See the video record in our youtube channel

Transcript

Transcript: From cybersecurity to terrorism - are we all under surveillance?

Messages

  • Lowering privacy and data protection standards is not the solution for combating terrorism.
  • Gathering of data should not be confused with requests for information when investigating crimes committed in cyberspace.
  • Transparency, privacy, security and encryption are essential for Internet users and more and more focus should be awarded to ensuring them.
  • National exceptions should be eliminated and human rights should be enforced. It is time to solidify frameworks both from a technical as well as political point of view.
  • The lack of harmonization for legal and lawful investigations is one of the biggest problems of the law enforcement community.
  • Authorities have a large appreciation of who is a terrorist, therefore surveillance measures are sometimes exceeding the proportionality, adequacy and predictability principles.
  • The cybersecurity definition should include and focus both on the end user as well as on the technical community and the justice department. Cybersecurity comes with protecting the end user and with secure systems, not against them.
  • It is crucial to protect a free and open Internet.
  • All legal principles apply to surveillance measures, therefore the rule of law is incremental applied to targeted surveillance. More training and skills are needed for correct information management of both intelligence agencies and police.

Session twitter hashtag

Hashtag: #eurodig16