Sismi-Telecom» Trial

Total Page:16

File Type:pdf, Size:1020Kb

Sismi-Telecom» Trial Geographic Information Systems Conference and Exhibition “GIS ODYSSEY 2016”, 5th to 9th of September 2016, Perugia, Italy Conference proceedings CYBER-SECURITY IN ITALY: ON LEGAL ASPECTS OF THE «SISMI-TELECOM» TRIAL Giovanni Luca Bianco, Ph.D. Ionian Departament of Law Economics and Environment University of Bari e-mail: [email protected] Bari, Italy Abstract «SISMI-Telecom scandal», as it is known in Italy, is illegal phone tapping by some people in charge of security at the Telecom Italia Company. The case became common knowledge in September 2006 because 34 people were indicted and there were 21 provisional arrests among many employees at Telecom Italia, among national police and members of the Carabinieri Corps (paramilitary police of the Italian Armed Forces) and of the Guardia di Finanza (Inland Revenue Police)». In 2010, some journalists revealed what was happening and stated that thousands of people had been secretly put under unauthorised surveillance by Telecom Italia and illegal dossiers had been created. People’s lives were monitored as well as their bank accounts; even the data banks of the Italian Ministry of the Interior were accessed. Ultimately, the SISMI-Telecom trial ended with very mild sentences between settlements and state secrets. Yet, in the information age, the SISMI-Telecom scandal can be considered “dead” only from a procedural point of view. According to the interpretation of some experts on the case, the famous law that has destroyed and ordered the destruction of those dossiers, is a suicide law because those files were all in electronic format, and of course continue to circulate and keep producing poisons. Keywords: Cyber, Cybersecurity, Cyberspace, Cybercrime, Software Vulnerability, Ghioni Fabio, «Polis D’istinto» Agency, Secret Services, SISMI-Telecom Trial, Tavaroli Giuliano, Tiger Team. Introduction Cyber security can be defined as «the framework of requirements adopted to prevent information systems from being hacked or accessed by undesired intruders. It deals specifically with all the technologies, processes and procedures created to protect networks, computers and data from risks or unauthorised access» (ILSOLE24ORE.COM, 2015). All in all, this framework allow states, companies and legal persons to be secure (CYBER SECURITY NATIONAL LAB, 2015), and it serves as a safeguard especially against cyber crimes (WIKIPEDIA, 2016a) perpetrated by adversaries, competitors and notorious cyberterrorists. As a consequence of this and taking into account thedigital age we live in, it seems necessary to set up defence-related policies – also from a legal standpoint – in order to tackle these new types of threats. And then – if needed – to punish and, above all, discourage those who subvert the established order by holding exemplary and memorable trials (as we will see in the SISMI-Telecom scandal, as it is known). On the one hand, cyber security, cyber crimes, and cyberterrorists can be seen as neologismscyber marked by the prefix “cyber”. On the other hand, words like “security”, “terrorists”, “crimes” are already part of a well-established legal and economiccyborgisation terminology. When talking about it,cyborg still seems something elusivecyborgs and new to the eye. For instance, in Italy in the famous Treccani Encyclopedia, it speaks of the “cyborgizzazione” ( , or the act of gaining -like features) of nature or of , when it comes to genetics or cybernetics respectively.cyb The former orgdefinition deals with the insertion of even a clock (TRECCANI, 2016a) into the genetic structure of seeds [used in agriculture]; the latter refers to “cyborg” – from the word (ernetic) and (anism) – that is an «automaton of endless and exceptional physical and mental resources created by grafting synthetic limbs and organs onto living human bodies» (TRECCANI, 2016a): indeed, a humanoid robot. Such concepts might seem so futuristic to most of people that they may even qualify as science fiction. If we look deeper, the prefix cyber comes from the ancient Greek “kυβερ” (helmsman). There is nothing new about it, so what? The helmsman is the person who is at the helm of the ship and steers 35 Geographic Information Systems Conference and Exhibition “GIS ODYSSEY 2016”, 5th to 9th of September 2016, Perugia, Italy Conference proceedings using the currents of the Water and the Air to follow the desired route. After Columbus’s Discovery, all the ships were steering towards the new world to find gold. This precious metal was used as a collateral to “lead” all the commercial trades through money, which was in turn becoming currency, that is the new “current”. Only the real helmsmen (states and banks) managed to steer with such a “new” current. «Kυβερ» has always concerned governing something. For example, in the 1950s cybernetics (TRECCANI, 2016b) was created by N. Wiener – from kυβερ (helsman) + τέχνη (art) – that is the art of steering. The subject of this field is the study and the control of active and living systems (states, beehives among others) and non-living ones (electric circuits). Cybernetics, according to Oskar Lange «came to being as a general science of regulation and control of the systems consisting of various and mutually related elements»cyber(LANGE, 1977, p. 10). AmongInformation these systems, capitalism and communism were worthy of mention. Nowadays, the prefix applies to the new Gold, « », which is fast-moving in the age we live in and emerges in the outlined paths of the new telematic and global framework. All things considered, cyber security aims at answering the same old question put by Sun Tzu almost 2,500 years ago: «If you know the enemy and know yourself, you need not fear the result of a hundredThe Art ofbattles. War If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle» (SUN TZUThe, tip of the iceberg). Telecom Italia When searching for the «SISMI-Telecom scandal», at the beginning of the Wikipedia page it says «illegal phones tapping by some people in chargeTelecom of security Italia at the Company. [The case] becameCarabinieri common knowledge in September 2006 because 34 people were indicted and thereGuardia were 21di Finanzaprovisional arrests among many employees at , among national police and members of the Corps (paramilitary police of the Italian Armed Forces) and of the [Inland Revenue Police]». Telecom Italia In 2010, the journalist P. Gomez revealed what was happening and stated that thousands of people had been secretly put under unauthorised surveillance by and illegal dossiers had been created. People’s lives were monitored as well as their bank accounts;Telecom evenItalia the data banks of the Italian Ministry of the Interior were accessed. After many years, «all of this would now turn out toBEPPEGRILLO.IT be a joke, or close to it, [because]the major defendants in the trial – employees – are doing plea bargains and the sentence is confined to limited compensation for damages» ( , 2010a). Telecom Italia So far, the top managers have been witnesses to the trial without turning out to be defendants charged as such. According to the judges in the criminalBEPPEGRILLO.IT proceedings, the CEO was far from being aware of the thousands of interceptions occurring within his company and there is no proof beyond reasonable doubt that he is guilty ( , 2010b). Whencarabinieri the scandal came to public knowledge, the major Italian telecommunication company, the Italian Intelligence Agencies (and maybe other foreign ones?), the national police and the were all involved in it. The representation of this case was purposely deceptive – both the mass-media and the proceedings were misleading – in order to have people focus only on minor aspects of the case instead of devoting their attention to the real sides of the scandal, MensincludingMentis the fight to acquire power and the aim to control people’s brains using the Internet. Institutions, companies and individuals are seeking this power to «GovernMent» («Govern / » – «Govern-Minds»). In fact, looking at the mass-media records and articles in journals about this scandal, it appears that only part of the truth has been revealed. This effect can be explained by Freud’s iceberg metaphor. The Austrian scholar compared the mind with an iceberg: the conscious mind is seen as the tip of the iceberg – generally accounting for the tenth part of the entire volume – the part which is hidden underwater more or less accounts for 9/10ths of the volume and represents the unconsciousness. In the iceberg of the «SISMI-Telecom scandal», what is normally seen is only the floating part above the surface, which is controlled by the media; at the same time, public opinion is not aware of the biggest part below the surface, up against which, following the definition, given by C. Mortati, of the “material” (real) constitution of a state, press the forces of vested interests. In this way, A. Monti claims that – in the field of cybernetic wars – we can «reasonably think that “outside” of courtrooms there is much more than the judges and police officers really know» (MONTI, 2005, p. 6). It is actually that which Vico’s Theory of «historical recurrence» suggests and it is discovered only 36 Geographic Information Systems Conference and Exhibition “GIS ODYSSEY 2016”, 5th to 9th of September 2016, Perugia, Italy Conference proceedings by those people who can thoroughly analyse the situation. In 2005 – when the internet was still at the beginning of its evolution – Monti outlined that «the search for words like “Internet” and “crime” on the latest available version of the jurisprudential references (case-law database) [produces] 31 occurrences regarding sentences made by the Supreme Court for criminal offences. [Among them], 6 deal with infringement of gambling laws, 14 cases of child pornography and “distribution of obscene material» (MONTI, 2005, p. 5), 3 cases of defamation, 2 cases of prostitution, 1 case of harassment, fraud, unauthorised possession of passwords, interceptions, drugs and intellectual property infringement.
Recommended publications
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • MILITARY INTELLIGENCE PB 34-04-4 Volume 30 Number 4 October-December 2004 STAFF: FEATURES Commanding General Major General Barbara G
    MILITARY INTELLIGENCE PB 34-04-4 Volume 30 Number 4 October-December 2004 STAFF: FEATURES Commanding General Major General Barbara G. Fast 8 Tactical Intelligence Shortcomings in Iraq: Restructuring Deputy Commanding General Battalion Intelligence to Win Brigadier General Brian A. Keller by Major Bill Benson and Captain Sean Nowlan Deputy Commandant for Futures Jerry V. Proctor Director of Training Development 16 Measuring Anti-U.S. Sentiment and Conducting Media and Support Analysis in The Republic of Korea (ROK) Colonel Eileen M. Ahearn by Major Daniel S. Burgess Deputy Director/Dean of Training Development and Support 24 Army’s MI School Faces TRADOC Accreditation Russell W. Watson, Ph.D. by John J. Craig Chief, Doctrine Division Stephen B. Leeder 25 USAIC&FH Observations, Insights, and Lessons Learned Managing Editor (OIL) Process Sterilla A. Smith by Dee K. Barnett, Command Sergeant Major (Retired) Editor Elizabeth A. McGovern 27 Brigade Combat Team (BCT) Intelligence Operations Design Director SSG Sharon K. Nieto by Michael A. Brake Associate Design Director and Administration 29 North Korean Special Operations Forces: 1996 Kangnung Specialist Angiene L. Myers Submarine Infiltration Cover Photographs: by Major Harry P. Dies, Jr. Courtesy of the U.S. Army Cover Design: 35 Deconstructing The Theory of 4th Generation Warfare Specialist Angiene L. Myers by Del Stewart, Chief Warrant Officer Three (Retired) Purpose: The U.S. Army Intelli- gence Center and Fort Huachuca (USAIC&FH) publishes the Military DEPARTMENTS Intelligence Professional Bulle- tin quarterly under provisions of AR 2 Always Out Front 58 Language Action 25-30. MIPB disseminates mate- rial designed to enhance individu- 3 CSM Forum 60 Professional Reader als’ knowledge of past, current, and emerging concepts, doctrine, materi- 4 Technical Perspective 62 MIPB 2004 Index al, training, and professional develop- ments in the MI Corps.
    [Show full text]
  • An Unfinished Debate on NATO's Cold War Stay-Behind Armies
    The British Secret Service in Neutral Switzerland: An Unfinished Debate on NATO’s Cold War Stay-behind Armies DANIELE GANSER In 1990, the existence of a secret anti-Communist stay-behind army in Italy, codenamed ‘Gladio’ and linked to NATO, was revealed. Subsequently, similar stay-behind armies were discovered in all NATO countries in Western Europe. Based on parliamentary and governmental reports, oral history, and investigative journalism, the essay argues that neutral Switzerland also operated a stay-behind army. It explores the role of the British secret service and the reactions of the British and the Swiss governments to the discovery of the network and investigates whether the Swiss stay-behind army, despite Swiss neutrality, was integrated into the International NATO stay-behind network. INTRODUCTION During the Cold War, secret anti-Communist stay-behind armies existed in all countries in Western Europe. Set up after World War II by the US foreign intelligence service CIA and the British foreign intelligence service MI6, the stay-behind network was coordinated by two unorthodox warfare centres of the North Atlantic Treaty Organisation (NATO), the ‘Clandestine Planning Committee’ (CPC) and the ‘Allied Clandestine Committee’ (ACC). Hidden within the national military secret services, the stay-behind armies operated under numerous codenames such as ‘Gladio’ in Italy, ‘SDRA8’ in Belgium, ‘Counter-Guerrilla’ in Turkey, ‘Absalon’ in Denmark, and ‘P-26’ in Switzerland. These secret soldiers had orders to operate behind enemy lines in
    [Show full text]
  • “We Will Crush You”
    “We Will Crush You” The Restriction of Political Space in the Democratic Republic of Congo Copyright © 2008 Human Rights Watch All rights reserved. Printed in the United States of America ISBN: 1-56432-405-2 Cover design by Rafael Jimenez Human Rights Watch 350 Fifth Avenue, 34th floor New York, NY 10118-3299 USA Tel: +1 212 290 4700, Fax: +1 212 736 1300 [email protected] Poststraße 4-5 10178 Berlin, Germany Tel: +49 30 2593 06-10, Fax: +49 30 2593 0629 [email protected] Avenue des Gaulois, 7 1040 Brussels, Belgium Tel: + 32 (2) 732 2009, Fax: + 32 (2) 732 0471 [email protected] 64-66 Rue de Lausanne 1202 Geneva, Switzerland Tel: +41 22 738 0481, Fax: +41 22 738 1791 [email protected] 2-12 Pentonville Road, 2nd Floor London N1 9HF, UK Tel: +44 20 7713 1995, Fax: +44 20 7713 1800 [email protected] 27 Rue de Lisbonne 75008 Paris, France Tel: +33 (1)43 59 55 35, Fax: +33 (1) 43 59 55 22 [email protected] 1630 Connecticut Avenue, N.W., Suite 500 Washington, DC 20009 USA Tel: +1 202 612 4321, Fax: +1 202 612 4333 [email protected] Web Site Address: http://www.hrw.org November 2008 1-56432-405-2 “We Will Crush You” The Restriction of Political Space in the Democratic Republic of Congo Map of the Democratic Republic of Congo ................................................................ 1 I. Summary ............................................................................................................... 2 Methodology ....................................................................................................... 7 II. Recommendations ............................................................................................... 9 To the Congolese Government ............................................................................. 9 To the Congolese National Assembly and Senate .............................................. 10 To International Donors ..................................................................................... 10 To MONUC and the Office of the High Commissioner for Human Rights (OHCHR) 10 III.
    [Show full text]
  • Defense Primer: National and Defense Intelligence
    Updated December 30, 2020 Defense Primer: National and Defense Intelligence The Intelligence Community (IC) is charged with providing Intelligence Program (NIP) budget appropriations, which insight into actual or potential threats to the U.S. homeland, are a consolidation of appropriations for the ODNI; CIA; the American people, and national interests at home and general defense; and national cryptologic, reconnaissance, abroad. It does so through the production of timely and geospatial, and other specialized intelligence programs. The apolitical products and services. Intelligence products and NIP, therefore, provides funding for not only the ODNI, services result from the collection, processing, analysis, and CIA and IC elements of the Departments of Homeland evaluation of information for its significance to national Security, Energy, the Treasury, Justice and State, but also, security at the strategic, operational, and tactical levels. substantially, for the programs and activities of the Consumers of intelligence include the President, National intelligence agencies within the DOD, to include the NSA, Security Council (NSC), designated personnel in executive NGA, DIA, and NRO. branch departments and agencies, the military, Congress, and the law enforcement community. Defense intelligence comprises the intelligence organizations and capabilities of the Joint Staff, the DIA, The IC comprises 17 elements, two of which are combatant command joint intelligence centers, and the independent, and 15 of which are component organizations military services that address strategic, operational or of six separate departments of the federal government. tactical requirements supporting military strategy, planning, Many IC elements and most intelligence funding reside and operations. Defense intelligence provides products and within the Department of Defense (DOD).
    [Show full text]
  • Russian Intelligence Services and Special Forces
    BRIEFING PAPER Number CBP 8430, 30 October 2018 Russian intelligence By Ben Smith services and special forces Contents: 1. KGB reborn? 2. GRU 3. Spetsnaz 4. What’s new? www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary 2 Russian intelligence services and special forces Contents Summary 3 1. KGB reborn? 4 1.1 FSB 4 1.2 SVR 5 1.3 FSO and GUSP 5 2. GRU 7 Cyber warfare 7 NCSC Review 8 3. Spetsnaz 9 4. What’s new? 12 Cover page image copyright: Special operations forces of the Russian Federation by Ministry of Defence of the Russian Federation (Mil.ru). Licensed under the Creative Commons Attribution 4.0 International license / image cropped. 3 Commons Library Briefing, 30 October 2018 Summary The Salisbury incident and its aftermath brought the Russian secret services into the spotlight. Malcolm Chalmers of Royal United Services Institute said Russian security services were going well beyond normal spying practice: “By launching disruptive operations that threaten life in target societies, they blur the line between war and peace”. The main domestic service, the FSB, is a successor to the Communist-era KGB. It is responsible for counter-terrorism and counter espionage and Russian information security. Critics say that it continues the KGB’s work of persecution of ‘dissidents’ and is guilty of torture and other human rights violations, and of extortion and corruption. One estimate put its staff complement at 200,000, and it has grown in power, particularly since the election of Vladimir Putin as President of Russia.
    [Show full text]
  • Impersonal Names Index Listing for the INSCOM Investigative Records Repository, 2010
    Description of document: US Army Intelligence and Security Command (INSCOM) Impersonal Names Index Listing for the INSCOM Investigative Records Repository, 2010 Requested date: 07-August-2010 Released date: 15-August-2010 Posted date: 23-August-2010 Title of document Impersonal Names Index Listing Source of document: Commander U.S. Army Intelligence & Security Command Freedom of Information/Privacy Office ATTN: IAMG-C-FOI 4552 Pike Road Fort George G. Meade, MD 20755-5995 Fax: (301) 677-2956 Note: The IMPERSONAL NAMES index represents INSCOM investigative files that are not titled with the name of a person. Each item in the IMPERSONAL NAMES index represents a file in the INSCOM Investigative Records Repository. You can ask for a copy of the file by contacting INSCOM. The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source.
    [Show full text]
  • 2019 National Intelligence Strategy of the United State
    The National Intelligence Strategy of the United States of America IC Vision A Nation made more secure by a fully integrated, agile, resilient, and innovative Intelligence Community that exemplifies America’s values. IC Mission Provide timely, insightful, objective, and relevant intelligence and support to inform national security decisions and to protect our Nation and its interests. This National Intelligence Strategy (NIS) provides the Intelligence Community (IC) with strategic direction from the Director of National Intelligence (DNI) for the next four years. It supports the national security priorities outlined in the National Security Strategy as well as other national strategies. In executing the NIS, all IC activities must be responsive to national security priorities and must comply with the Constitution, applicable laws and statutes, and Congressional oversight requirements. All our activities will be conducted consistent with our guiding principles: We advance our national security, economic strength, and technological superiority by delivering distinctive, timely insights with clarity, objectivity, and independence; we achieve unparalleled access to protected information and exquisite understanding of our adversaries’ intentions and capabilities; we maintain global awareness for strategic warning; and we leverage what others do well, adding unique value for the Nation. IAL-INTE AT LL SP IG O E E N G C E L A A G N E O I N T C A Y N U N A I IC T R E E D S M TATES OF A From the Director of National Intelligence As the Director of National Intelligence, I am fortunate to lead an Intelligence Community (IC) composed of the best and brightest professionals who have committed their careers and their lives to protecting our national security.
    [Show full text]
  • Report on the Democratic Oversight of the Security Services
    Strasbourg, 15 December 2015 CDL-AD(2015)010 Or. Engl. Studies no. 388 / 2006 and no.719/2013 EUROPEAN COMMISSION FOR DEMOCRACY THROUGH LAW (VENICE COMMISSION) REPORT ON THE DEMOCRATIC OVERSIGHT OF THE SECURITY SERVICES Adopted by the Venice Commission at its 71st Plenary Session (Venice, 1-2 June 2007) On the basis of comments by Mr Iain Cameron (Substitute member, Sweden) Mr Olivier Dutheillet de Lamothe (Substitute member, France) Mr Jan Helgesen (Member, Norway) Mr Valery Zorkin (Member, Russian Federation) Mr Ian Leigh (Expert, United Kingdom) Mr Franz Matscher (Expert, Austria) Updated by the Venice Commission at its 102nd Plenary Session (Venice, 20-21 March 2015) On the basis of comments by Mr Iain Cameron (Member, Sweden) This document will not be distributed at the meeting. Please bring this copy. http://venice.coe.int CDL-AD(2015)010 - 2 - TABLE OF CONTENTS Executive Summary .................................................................................................................... 4 The need to control security services .......................................................................................... 4 Accountability .............................................................................................................................. 4 Parliamentary Accountability ....................................................................................................... 5 Judicial review and authorisation ................................................................................................ 6
    [Show full text]
  • Intelligence and Security Committee of Parliament
    Intelligence and Security Committee of Parliament Annual Report 2016–2017 Chair: The Rt. Hon. Dominic Grieve QC MP Intelligence and Security Committee of Parliament Annual Report 2016–2017 Chair: The Rt. Hon. Dominic Grieve QC MP Presented to Parliament pursuant to sections 2 and 3 of the Justice and Security Act 2013 Ordered by the House of Commons to be printed on 20 December 2017 HC 655 © Crown copyright 2017 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open- government-licence/version/3 Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at isc.independent.gov.uk Any enquiries regarding this publication should be sent to us via our webform at isc.independent.gov.uk/contact ISBN 978-1-5286-0168-9 CCS1217631642 12/17 Printed on paper containing 75% recycled fibre content minimum Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office THE INTELLIGENCE AND SECURITY COMMITTEE OF PARLIAMENT This Report reflects the work of the previous Committee,1 which sat from September 2015 to May 2017: The Rt. Hon. Dominic Grieve QC MP (Chair) The Rt. Hon. Richard Benyon MP The Most Hon. the Marquess of Lothian QC PC (from 21 October 2016) The Rt. Hon. Sir Alan Duncan KCMG MP The Rt. Hon. Fiona Mactaggart MP (until 17 July 2016) The Rt. Hon.
    [Show full text]
  • Surveillance by Intelligence Services: Fundamental Rights Safeguards And
    FREEDOMS FRA Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU and remedies safeguards rights fundamental services: intelligence by Surveillance Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks This report addresses matters related to the respect for private and family life (Article 7), the protection of personal data (Article 8) and the right to an effective remedy and a fair trial (Article 47) falling under Titles II ‘Freedoms’ and VI ‘Justice’ of the Charter of Fundamental Rights of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Photo (cover & inside): © Shutterstock More information on the European Union is available on the Internet (http://europa.eu). FRA – European Union Agency for Fundamental Rights Schwarzenbergplatz 11 – 1040 Vienna – Austria Tel. +43 158030-0 – Fax +43 158030-699 fra.europa.eu – [email protected] Luxembourg: Publications Office of the European Union, 2015 Paper: 978-92-9239-944-3 10.2811/678798 TK-04-15-577-EN-C PDF: 978-92-9239-943-6 10.2811/40181 TK-04-15-577-EN-N © European Union Agency for Fundamental Rights, 2015 Reproduction is authorised, provided the source is acknowledged. Printed in Luxembourg Printed on process chlorine-free recycled paper (PCF) Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks Foreword Protecting the public from genuine threats to security and safeguarding fundamental rights involves a delicate bal- ance, and has become a particularly complex challenge in recent years.
    [Show full text]
  • Exhibits Attached to Arguments on Admissibility, Declaration of Mohammed Abdullah Saleh Al-Asad, and Declaration of Zahra Ahmed Mohamed
    BEFORE THE AFRICAN COMMISSION FOR HUMAN & PEOPLES’ RIGHTS 49th ORDINARY SESSION: APRIL-MAY 2011 COMMUNICATION NO. 383/2010 In the matter between: MOHAMMED ABDULLAH SALEH AL-ASAD and DJIBOUTI EXHIBITS ATTACHED TO ARGUMENTS ON ADMISSIBILITY, DECLARATION OF MOHAMMED ABDULLAH SALEH AL-ASAD, AND DECLARATION OF ZAHRA AHMED MOHAMED EXHIBITS The United Republic of Tanzania Departure Declaration Card, 27 December 2003…….A Center for Human Rights and Global Justice, On the Record: U.S. Disclosures on Rendition, Secret Detention, and Coercive Interrogation (New York: NYU School of Law, 2008)………………………………………………………………………………..B Letter to the Attorney General of Djibouti, 31 March 2009…….….…..…….…….….…C United Nations Human Rights Council, 13th Session, Joint Study on Global Practices in Relation to Secret Detention in the Context of Countering Terrorism, U.N. Doc. A/HRC/13/42 (19 February 2010)………………………………………………………. D Republic v. Director of Immigration Services, ex parte Mohammed al-Asad (Habeas Corpus petition), High Court of Tanzania, 17 June 2004………………………………...E Amnesty International, United States of America: Below the radar- Secret flights to torture and ‘disappearance,’ 5 April 2006……………………………………………….F Prepared Remarks of Treasury Secretary John Snow to Announce Joint U.S. and Saudi Action Against Four Branches of Al-Haramain in the Financial War on Terror, JS-1107, 22 January 2004…………………………………………………………………………..G Henry Lyimo, Guardian (Dar es Salaam), Yemenis, Italians Expelled, 30 December 2003…………………………………………………………………………………...….H Roderick Ndomba, Daily News (Dar es Salaam), Dar Deports 2,367 Aliens, 30 December 2003……...……………………………..………………………………………………….I International Committee of the Red Cross, ICRC Report on the Treatment of Fourteen “High Value Detainees” in CIA Custody, 2007…………………………..……….……...J International Seismological Centre Earthquake Data…………………………………….K U.S.
    [Show full text]