data mining and counter - terrorism

download report

Transcript data mining and counter - terrorism

DATA MINING AND COUNTER TERRORISM
Salli Anne Swartz
Artus Wise Partners
[email protected]
Paris, France
On December 21, 2012 : The French Parliment enacted the
(NAME IN FRENCH) or the Security and Counter Terrorism Law.
This Law extends (extends what? Existing legislation? If so,
please state which legislation) and specifies the preventive (why
preventative?)legislation about data mining.
• July 24? 2015 : Enactment of the Intelligence Act
• The French government implemented (? What does this mean in this
context) this Act but not the Section on data mining because the effective
date has been delayed to the nomination of the President of the
Commission nationale de contrôle des techniques de renseignements”,
(CNCTR)
• The CNCRT, “is an organ in charge to advise the Prime Minister on the
opportunities to use, or not, a data-mining devices
TOPICS
• I – METHODS OF DATA MINING AND COLLECTED INFORMATION
• II – ACCESS TO PRIVATE INFORMATION BY GOVERNMENTAL
ENTITIES
• III – ENTITY RELAYING INFORMATION (what is this? I don’t
understand)
• IV – PERMITTED DATA RETENTION PERIOD
• V – (TENDENCY?) Do you mean the possibilitiy? TO EXPAND DATA
MINING BEYOND COUNTER- TERRORISM
• VI – CRIMINAL SANCTIONS
I - METHODS OF DATA MINING
AND COLLECTED INFORMATIONS
1)
Methods of data mining
a) Technical means to capture images and words
b) Technical means to capture computer science… I don’t understand
what this means…
2) Information collected
a) All type of information
b) Intercepted correspondence(isn’t this covered by a)? How is it
different?
METHODS OF
DATA MINING
Technical means to capture images and words
 Article L 853-1- I of the Internal Security Code provides for the use
of technical means for the « captation, fixation, the transmission,
and the record of private or confidential statements or the pictures
in a private places »
 Authorization for 2 months (to do what?)
 Destruction of the information within 30 days
METHODS OF
DATA MINING
Device to capture computer science ????
Article L853-2-I of the Internal Security Code provide for the possibility
to access, record and transfer data mining stored in a computer systems with
a technical means which provides covers?:
• the information as it appears on the computer monitor of the utilizator of
data processing treatment ?? NOT CLEAR, Such as ????
• the information received and emitted by audiovisual peripherals NOT
CLEAR such a????
• GIVE EXAMPLES
COLLECTED
INFORMATION
All type of information
Article L851-1 of the Internal Security Code : Information or
documents can be collected , processed and/or stored by the
computer network or the electronic communication services : what is
this?
COLLECTED
INFORMATIONS
Intercepted correspondence :
Article 852-1 of the Internal Security Code
 Intercepted correspondence issued by a electronic communication
may also be controlled and collected
 The authorization of interception gives also the authorization of
collection
 The authorization may be extended to the entourage of the target if there
is serious grounds to believe that they can provide some informations
 Destruction of the informations after 30 days if it appears that there is no
connexion with the delivery authorization
II – ACCESS TO PRIVATE INFORMATIONS
BY GOVERNMENTAL ENTITIES,
A PROCEDURAL UNDER AUTHORIZATION
• 1 – Who can acces to the informations ?
• 2 – For what goal ?
• 3 – Who gives the authorization ?
ACCESS TO PRIVATE INFORMATIONS
BY GOVERNMENTAL ENTITIES,
A PROCEDURAL UNDER AUTHORIZATION
Who can acces to the informations ?
 The intelligence agencies (Article L811-2 of the Internal Security
Code)
 The « intelligence community » (L811-4 o the Internal Security
Code)
MOST IMPORTANT INTELLIGENCE
AGENCIES AND COMMUNITIES
IN FRANCE
Ministry of Interior
DGSI - Direction générale de
la sécurité intérieure
Directorate General for
Internal Security
UCLAT – Unité de coordination
de la lutte anti-terroriste
The Co-ordination unit
of the fight against
terrorism
(Intelligence community)
Ministry of Defense
DRM – Direction du
Renseignement militaire
Directorate of Military
Intelligence
DGSE - Direction Générale
de la Sécurité Extérieure
Directorate General
for External Security
MOST IMPORTANT INTELLIGENCE
AGENCIES AND COMMUNITIES
IN FRANCE
Ministry of economy and finances
DNRED – Direction Nationale du
Renseignement et des Enquêtes
Douanières - National Directorate
of the Intelligence
and Customs Investigations
TRACFIN - Traitement du renseignement et
action contre les circuits financiers clandestins
Since its foundation in 1990 its aim is to fight
against illegal financial operations,
money laundering and terrorism financing
ACCESS TO PRIVATE INFORMATIONS
BY GOVERNMENTAL ENTITIES,
A PROCEDURAL UNDER AUTHORIZATION
What are the goals ?
National independence and
defense
Major interest of the foreign
policy, execution of he
european and inernational
settlements and foreign
meddling prevention
Proliferation of WMD
prevention
Major economic, scientific
and industrial interest
Prevention against the
collective violence infrindging
the « Public peace »
Prevention of the action
leading of the continuation or
reconstitution of abolished
groups
Prevention against the
subvertion of the Institution’s
republican form
Crime and organized
delinquency prevention
Terrorism prevention
ACCESS TO PRIVATE INFORMATIONS
BY GOVERNMENTAL ENTITIES,
A PROCEDURAL UNDER AUTHORIZATION
Who gives the authorization ?
 The Prime Minister gives the authorization
 This authorization is given after obtaining the opinion of the CNCTR
THE CNCTR
• National commission of Intelligence methods« Commission
nationale des techniques de renseignements »
• Independent administrative authority
• Replace the CNCIS (National Commission of security interceptions
supervision – « Commission nationale de contrôle des interceptions
de sécurité »)
• 9 members : 2 deputies, 2 senators, 2 members of the Council of
State, 2 magistrates of Court of cassation, 1 representative of the
ARCEP (the French telecommunications and postal regulatory body)
PRELIMINARY OPINION
OF THE CNCTR
Ordinary procedure
MINISTER
authorization
request (L8212 CSI)
CNCTR gives an
opinion within
24hrs (L821-3
CSI)
PRIME MINISTER
authorizes
implementation
for 4 months or
refuses
Implementation
of the measure
PRELIMINARY OPINION
OF THE CNCTR
Emergency procedure
MINISTER
authorization
request (L821-2
CSI)
PRIME MINISTER
authorizes
implementation for
4 months (L821-1 .
L821-4 CSI)
Implementation
of the measure
III – ENTITY RELAYING
INFORMATIONS (Art. L 851-1 CSI)
• Operators of Telecom and network communication (are include the
service providers like skype, viber..)
• Internet acces providers, hosting compagnies…
IV - DATA RETENTION PERIOD
(L822-2-I CSI)
30 days for the
intercepted
correspondences
and words
capted
6 years for the
informations or
documents
which are
encrypted
4 years for the
informations or
documents
No delay for the
cyber attack data
V – TENDENCY TO EXPAND
DATA MINING BEYOND
COUNTER-TERRORISM
• The law provides some specific derogations for the terrorism
prevention
• The operators and Intelligence agencies could be obligated to install
an automated data processing system on their network
• This system will detect the « sensitive » connexions (which
represents an terrorist threat)
• France has 13 Internet Exchange Points where we can install this
system.
VI – SPECIFIC CRIMINAL
SANCTIONS
What’s happen when someone decides to reveal the implementation of
an intelligence process ?
What’s happen when someone refuses to deliver the information to the
Intelligence agencies ?
What’s happen when someone
decides to reveal the implementation
of an intelligence process ?
 Revealing an implementation of an intelligence process is punished
by 1 year’ imprisonment and a fine from 15 000 to 45 000 euros (when
it’s committed in bad faith), Article 881-1 of the Internal Security
Code
What’s happen when someone
refuses to deliver the information
to the Intelligence agencies ?
 The opposition to deliver informations is punished by 2 years’
imprisonment and a fine of 150 000 euros, Article 881-2 and -3 of the
Internal Security Code