National Security and Secret Evidence in Legislation and Before the Courts

Total Page:16

File Type:pdf, Size:1020Kb

National Security and Secret Evidence in Legislation and Before the Courts National Security and Secret Evidence in Legislation and before the Courts: Exploring the Challenges Didier Bigo, Sergio Carrera, Nicholas Hernanz and Amandine Scherrer No. 78/ January 2015 Abstract This study provides a comparative analysis of the national legal regimes and practices governing the use of intelligence information as evidence in the United Kingdom, France, Germany, Spain, Italy, the Netherlands and Sweden. It explores notably how national security can be invoked to determine the classification of information and evidence as 'state secrets' in court proceedings and whether such laws and practices are fundamental rights- and rule of law-compliant. The study finds that, in the majority of Member States under investigation, the judiciary is significantly hindered in effectively adjudicating justice and guaranteeing the rights of the defence in ‘national security’ cases. The research also illustrates that the very term ‘national security’ is nebulously defined across the Member States analysed, with no national definition meeting legal certainty and “in accordance with the law” standards and a clear risk that the executive and secret services may act arbitrarily. The study argues that national and transnational intelligence community practices and cooperation need to be subject to more independent and effective judicial accountability and be brought into line with EU 'rule of law' standards. This document was originally commissioned by the European Parliament's Committee on Civil Liberties, Justice and Home Affairs (LIBE) and published in December 2014. It is available for free downloading on the European Parliament’s website (www.europarl.europa.eu/RegData/etudes/STUD/2014/509991/IPOL_STU(2014)509 991_EN.pdf) and is republished by CEPS with the kind permission of the Parliament. CEPS Papers in Liberty and Security in Europe offer the views and critical reflections of CEPS researchers and external collaborators on key policy discussions surrounding the construction of the EU’s Area of Freedom, Security and Justice. The series encompasses policy-oriented and interdisciplinary academic studies and commentary about the internal and external implications of Justice and Home Affairs policies inside Europe and elsewhere throughout the world. Unless otherwise indicated, the views expressed are attributable only to the authors in a personal capacity and not to any institution with which they are associated. This publication may be reproduced or transmitted in any form for non-profit purposes only and on the condition that the source is fully acknowledged. ISBN 978-94-6138-440-9 Available for free downloading from the CEPS website (www.ceps.eu) ©CEPS, 2015 Contents Executive Summary ................................................................................................................................ i 1. Introduction.....................................................................................................................................1 1.1 The scope of the challenge .....................................................................................................1 1.2 Study methodology, terminology and structure .......................................................................6 1.2.1 Methodology .................................................................................................................6 1.2.2 Terminology and concepts .............................................................................................6 1.2.3 Structure ........................................................................................................................7 2. National regimes and practices in EU Member States on the use of intelligence information by courts .....................................................................................................................9 2.1 The United Kingdom and the use of closed material procedures (CMPs) .............................. 10 2.2 The use of secrecy in the Netherlands – the Act on Shielded Witnesses ................................ 13 2.3 Member States where the use of classified intelligence information as evidence is practised by national courts ..................................................................................................................... 14 2.4 Member States where there is no use of secret evidence in trials ........................................... 16 2.5 Classification and declassification of secret intelligence information .................................... 17 2.6 Justifications for the use of state secrets – what is national security? ..................................... 18 3. Assessing the reliance of the EU Member States’ justice systems on intelligence information in courts: The issue of scrutiny ................................................................................... 22 3.1 Assessing the quality of information used to convict an individual before the courts ............. 22 3.2 Digital surveillance and scrutiny in a post-Snowden era ....................................................... 24 3.3 Secrecy and government officials’ accountability ................................................................. 26 4. When judicial scrutiny goes transnational: European judiciary standards ....................................... 29 4.1 European Convention on Human Rights Standards ............................................................... 30 4.1.1 “In accordance with the law” test ................................................................................. 30 4.1.2 "Necessary in a democratic society" test....................................................................... 31 4.1.3 Effective remedies and effective judicial controls ......................................................... 33 4.2 EU Principles and Standards ................................................................................................ 35 4.2.1 Judicial scrutiny and effective judicial review in the EU legal system ........................... 35 4.2.2 Key EU case law in the use of intelligence information in EU antiterrorism policies..... 36 4.2.3 The use of intelligence information before the Luxembourg courts ............................... 39 5. Freedom of the press and protection of whistle-blowers ................................................................. 41 5.1 ‘State secrets’, the freedom of the press and the right to information ..................................... 41 5.2 Whistle-blowing: public awareness v. classified materials .................................................... 44 6. Conclusions and recommendations ................................................................................................ 47 6.1 General conclusions ............................................................................................................. 47 6.2 Policy recommendations ...................................................................................................... 49 References ............................................................................................................................................ 53 Annex 1. European and National Case-Law .......................................................................................... 57 Annex 2. Relevant Fundamental and Human Rights Provisions: the ECHR and the EU Charter ............ 60 Annex 3. Conceptual features of national security in selected EU Member States .................................. 61 Annex 4. Proceedings report of the 30 October Focus Groups ............................................................... 62 Annex 5. Country Fiches provided by the National Experts ................................................................... 65 Country Fiche: United Kingdom .................................................................................................... 66 Country Fiche: France ................................................................................................................... 70 Country Fiche: Germany ............................................................................................................... 81 Country Fiche: Italy ...................................................................................................................... 87 Country Fiche: Spain ..................................................................................................................... 95 Country Fiche: The Netherlands .................................................................................................. 104 Country Fiche: Sweden ............................................................................................................... 109 List of Abbreviations AIVD Algemene Inlichtingen- en Veiligheidsdienst (General Intelligence and Security Service, The Netherlands) AFSJ Area of Freedom, Security and Justice BKA Bundeskriminalamt (Federal Criminal Police Office, Germany) CCSDN Commission consultative sur le secret de la défense nationale (Consultative commission on national defence secrets, France) CIA Central Intelligence Agency (United States) CoE Council of Europe COPASIR Comitato Parlamentare per la Sicurezza della Repubblica (Parliamentary Committee for the Security of the Republic, Italy) CMPs Closed Material Procedures CNI Centro Nacional de Inteligencia (National Intelligence Centre, Spain) COREPER Permanent Representatives Committee (Council of the European Union configuration) CJEU Court of Justice of the European Union
Recommended publications
  • P7 TA(2013)0418 Alleged Transportation and Illegal Detention Of
    P7_TA(2013)0418 Alleged transportation and illegal detention of prisoners in European countries by the CIA European Parliament resolution of 10 October 2013 on alleged transportation and illegal detention of prisoners in European countries by the CIA (2013/2702(RSP)) The European Parliament, – having regard to the European Court of Human Rights (ECtHR) ruling of 13 December 2012 which condemns the Former Yugoslav Republic of Macedonia (FYROM) for the ‘extreme seriousness’ of its violations of the European Convention on Human Rights (Articles 3, 5, 8 and 13) during the extraordinary rendition of Khaled El-Masri, – having regard to the following cases pending before the ECtHR: Al Nashiri v Poland, Abu Zubaydah v Lithuania, Abu Zubaydah v Poland and Nasr and Ghali v Italy; having regard to the application filed by Mr Al Nashiri against Romania in August 2012 and to the application filed by the Human Rights Monitoring Institute (HRMI) and the Open Society Justice Initiative against Lithuania in December 2012 for violation of their right to information and right to an effective remedy, – having regard to the Italian Supreme Court ruling of September 2012 upholding the conviction of 23 US nationals in connection with the 2003 abduction of Abu Omar, including the former CIA Milan station chief, Robert Seldon Lady, who was sentenced to nine years in prison, – having regard to the Milan Appeal Court decision of February 2013 sentencing three other CIA agents1 previously considered to be covered by diplomatic immunity to six to seven years in prison;
    [Show full text]
  • Swedish Literature on the British Market 1998-2013: a Systemic
    Swedish Literature on the British Market 1998-2013: A Systemic Approach Agnes Broomé A thesis submitted for the degree of Doctor of Philosophy UCL Department of Scandinavian Studies School of European Languages, Culture and Society September 2014 2 I, Agnes Broomé, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. …............................................................................... 3 4 ABSTRACT This thesis examines the role and function of contemporary Swedish fiction in English translation on the British book market in the period 1998-2013. Drawing on Bourdieu’s Field Theory, Even Zohar’s Polysystem Theory and DeLanda’s Assemblage Theory, it constructs a model capable of dynamically describing the life cycle of border-crossing books, from selection and production to marketing, sales and reception. This life cycle is driven and shaped by individual position-takings of book market actants, and by their complex interaction and continual evolution. The thesis thus develops an understanding of the book market and its actants that deliberately resists static or linear perspectives, acknowledging the centrality of complex interaction and dynamic development to the analysis of publishing histories of translated books. The theoretical component is complemented by case studies offering empirical insight into the model’s application. Each case study illuminates the theory from a different angle, creating thereby a composite picture of the complex, essentially unmappable processes that underlie the logic of the book market. The first takes as its subject the British publishing history of crime writer Liza Marklund, as well as its wider context, the Scandinavian crime boom.
    [Show full text]
  • The Financial Intelligence Unit Annual Report 2019
    The Financial Intelligence Unit Annual Report 2019 Swedish Police Authority Content Preface ....................................................................................................3 The tasks and activities of the Financial Intelligence Unit ...4 The Financial Intelligence Unit in 2019 ........................................5 Money laundering ..............................................................................6 Characteristic modi operandi in 2019 .............................................8 BEC .......................................................................................................9 Vishing ................................................................................................10 Money laundering via online gambling accounts .......................11 Money laundering via real estate ...................................................11 Commercial money laundering ......................................................12 Cryptocurrency exchange agents ..........................................12 Commercial money laundering using a real estate agent’s escrow account ........................................13 Terrorist financing ............................................................................14 What constitutes terrorist offences and terrorist financing? .....14 What does terrorist financing look like? .......................................14 Cooperation ......................................................................................15 The international work of the Financial
    [Show full text]
  • Security Service Yearbook 2018
    1 Swedish Security Service Swedish 2018 2 Xx 3 Contents Preface 2018 - Reflections by the Head of the Security Service 4–5 2018 - Reflections Remit 4 by the Head of the The Swedish Security Service 6–7 Security Service in brief The cooperation International cooperation 8–9 The future Trends and tendencies 10–11 The elections 12 The elections Protecting the elections 12–15 Strategic cooperation for Sweden’s security 1 6 – 1 7 Threats The grey area 18–23 Strategic 16 cooperation Protective security Sweden’s security: stricter legislation in place 24–25 Protective security explained 26–27 Dignitary protection explained 2 8 – 3 0 The new Extremism Protective 24 Security Act Extreme unit 31–35 The drop that hollows the stone 36–37 Ideologically motivated crime 38–39 Reduction Counter-proliferation 40 Aliens cases 41 31 Extreme unit Contents 4 Klas Friberg The intelligence threat is also a security threat The world is changing faster than ever. Political developments in the Baltic Sea region as well as in the rest of Europe, the Middle East and China have an impact also on Sweden’s national security. In 2018, there were several incidents that put the ability of the Security Service to protect Sweden and our democratic form of government to the test. he threats to our country are threats and security is large and as cyber operations, strategic pur- more substantial than they ever-growing. chases and certain diplomatic initia- Thave been in many years. They In the past few years, we have tives, state actors seek to gain an are also broader and have taken on noted that Russia in particular has advantage that could be used to new forms.
    [Show full text]
  • The Influence of Austrian Voting Right of 1907 on the First Electoral Law of the Successor States (Poland, Romania [Bukovina], Czechoslovakia)
    ISSN 2411-9563 (Print) European Journal of Social Sciences May-August 2014 ISSN 2312-8429 (Online) Education and Research Volume 1, Issue 1 The influence of Austrian voting right of 1907 on the first electoral law of the successor states (Poland, Romania [Bukovina], Czechoslovakia) Dr Andrzej Dubicki Uniwersytet Łódzki Abstract As a result of collapse of the Central Powers in 1918 in Central Europe have emerged new national states e.g. Poland, Czechoslowakia, Hungaria, SHS Kingdom some of states that have existed before the Great War have changed their boundaries e.g. Romania, Bulgaria. But what is most important newly created states have a need to create their constituencies, so they needed a electoral law. There is a question in what manner they have used the solutions that have been used before the war in the elections held to the respective Parliaments (mostly to the Austrian or Hungarian parliament) and in case of Poland to the Tzarist Duma or Prussian and German Parliament. In the paper author will try to compare Electoral Laws that were used in Poland Czechoslowakia, and Romania [Bukowina]. The first object will be connected with the question in what matter the Austrian electoral law have inspired the solutions used in respective countries after the Great War. The second object will be connected with showing similarities between electoral law used in so called opening elections held mainly in 1919 in Austria-Hungary successor states. The third and final question will be connected with development of the electoral rules in respective countries and with explaining the reasons for such changes and its influence on the party system in respective country: multiparty in Czechoslovakia, hybrid in Romania.
    [Show full text]
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • The Cambridge Handbook of Immunities and International Law Edited by Tom Ruys , Nicolas Angelet , Luca Ferro Frontmatter More Information I
    Cambridge University Press 978-1-108-41788-4 — The Cambridge Handbook of Immunities and International Law Edited by Tom Ruys , Nicolas Angelet , Luca Ferro Frontmatter More Information i The Cambridge Handbook of Immunities and International Law Few topics of international law speak to the imagination as much as international immunities. Questions pertaining to immunity from jurisdiction or execution under international law surface on a frequent basis before national courts, including at the highest levels of the judicial branch and before international courts or tribunals. Nevertheless, international immunity law is and remains a challenging i eld for practitioners and scholars alike. Challenges stem in part from the uncertainty pertaining to the customary content of some immunity regimes said to be in a ‘state of l ux’, the divergent – and at times directly conl icting – approaches to immunity in different national and international jurisdictions, or the increasing intolerance towards impunity that has accompanied the advance of international criminal law and human rights law. Composed of 34 expertly written contributions, the present volume uniquely provides a comprehensive tour d’horizon of international immunity law, traversing a wealth of national and international practice. tom ruys is a professor of international law at Ghent University where he heads the Ghent Rolin- Jaequemyns International Law Institute. He holds a doctoral degree from the University of Leuven and is a member of the Brussels Bar. Tom is co- editor- in- chief of the Journal on the Use of Force and International Law and the Military Law and Law of War Review . He has been awarded the Francis Lieber Prize (2015 article prize and 2011 book prize) as well as the Francis Deák Prize (2015).
    [Show full text]
  • An Unfinished Debate on NATO's Cold War Stay-Behind Armies
    The British Secret Service in Neutral Switzerland: An Unfinished Debate on NATO’s Cold War Stay-behind Armies DANIELE GANSER In 1990, the existence of a secret anti-Communist stay-behind army in Italy, codenamed ‘Gladio’ and linked to NATO, was revealed. Subsequently, similar stay-behind armies were discovered in all NATO countries in Western Europe. Based on parliamentary and governmental reports, oral history, and investigative journalism, the essay argues that neutral Switzerland also operated a stay-behind army. It explores the role of the British secret service and the reactions of the British and the Swiss governments to the discovery of the network and investigates whether the Swiss stay-behind army, despite Swiss neutrality, was integrated into the International NATO stay-behind network. INTRODUCTION During the Cold War, secret anti-Communist stay-behind armies existed in all countries in Western Europe. Set up after World War II by the US foreign intelligence service CIA and the British foreign intelligence service MI6, the stay-behind network was coordinated by two unorthodox warfare centres of the North Atlantic Treaty Organisation (NATO), the ‘Clandestine Planning Committee’ (CPC) and the ‘Allied Clandestine Committee’ (ACC). Hidden within the national military secret services, the stay-behind armies operated under numerous codenames such as ‘Gladio’ in Italy, ‘SDRA8’ in Belgium, ‘Counter-Guerrilla’ in Turkey, ‘Absalon’ in Denmark, and ‘P-26’ in Switzerland. These secret soldiers had orders to operate behind enemy lines in
    [Show full text]
  • Chilling Effects on Free Expression: Surveillance, Threats and Harassment
    chapter 16 Chilling Effects on Free Expression: Surveillance, Threats and Harassment Elisabeth Eide Professor of Journalism Studies, Oslo Metropolitan University Abstract: This chapter addresses global surveillance as revealed by Edward Snowden in 2013 and discusses the effects such surveillance – and indeed its revelation – may have on freedom of the press and investigative journalism. The chilling effect – an act of discouragement – has proven to be an effective way of deterring public intel- lectuals and other citizens from voicing their opinions in the public sphere. This chapter presents some examples of how it works on practicing freedom of expres- sion for both groups and individuals, as well as how it may affect relationships between various actors in the public sphere, particularly the state and the media, and journalists/writers and politicians. Finally, it discusses consequences for the future of investigative journalism. Keywords: chilling effect, investigative journalism, surveillance, freedom of expression Rarely it is mentioned, in this regard, that surveillance fundamentally questions journalistic work as such – at least in its form of investigative journalism that requires confidential communication with sources. —Arne Hintz (2013) Introduction This chapter addresses the chilling effect on freedom of expression and free- dom of the press. As a case study, it discusses how investigative journalism, Citation: Eide, E. (2019). Chilling Effects on Free Expression: Surveillance, Threats and Harassment. In R. Krøvel & M. Thowsen (Eds.),Making Transparency Possible. An Interdisciplinary Dialogue (pp. 227–242). Oslo: Cappelen Damm Akademisk. https://doi.org/10.23865/noasp.64.ch16 License: CC BY-NC 4.0 227 chapter 16 revealing modern global surveillance helped by whistleblower Edward Snowden (in June 2013), may be hampered by this effect, oftentimes in the form of a tight relationship between state power and the media.
    [Show full text]
  • May 6–15, 2011 Festival Guide Vancouver Canada
    DOCUMENTARY FILM FESTIVAL MAY 6–15, 2011 FESTIVAL GUIDE VANCOUVER CANADA www.doxafestival.ca facebook.com/DOXAfestival @doxafestival PRESENTING PARTNER ORDER TICKETS TODAY [PAGE 5] GET SERIOUSLY CREATIVE Considering a career in Art, Design or Media? At Emily Carr, our degree programs (BFA, BDes, MAA) merge critical theory with studio practice and link you to industry. You’ll gain the knowledge, tools and hands-on experience you need for a dynamic career in the creative sector. Already have a degree, looking to develop your skills or just want to experiment? Join us this summer for short courses and workshops for the public in visual art, design, media and professional development. Between May and August, Continuing Studies will off er over 180 skills-based courses, inspiring exhibits and special events for artists and designers at all levels. Registration opens March 31. SUMMER DESIGN INSTITUTE | June 18-25 SUMMER INSTITUTE FOR TEENS | July 4-29 Table of Contents Tickets and General Festival Info . 5 Special Programs . .15 The Documentary Media Society . 7 Festival Schedule . .42 Acknowledgements . 8 Don’t just stand there — get on the bus! Greetings from our Funders . .10 Essay by John Vaillant . 68. Welcome from DOXA . 11 NO! A Film of Sexual Politics — and Art Essay by Robin Morgan . 78 Awards . 13 Youth Programs . 14 SCREENINGS OPEning NigHT: Louder Than a Bomb . .17 Maria and I . 63. Closing NigHT: Cave of Forgotten Dreams . .21 The Market . .59 A Good Man . 33. My Perestroika . 73 Ahead of Time . 65. The National Parks Project . 31 Amnesty! When They Are All Free .
    [Show full text]
  • The Protection of Journalistic Sources, a Cornerstone of the Freedom of the Press
    Thematic factsheet1 Last update: June 2018 THE PROTECTION OF JOURNALISTIC SOURCES, A CORNERSTONE OF THE FREEDOM OF THE PRESS According to the case-law of the European Court of Human Rights, the right of journalists not to disclose their sources is not a mere privilege to be granted or taken away depending on the lawfulness or unlawfulness of their sources, but is part and parcel of the right to information, to be treated with the utmost caution. Without an effective protection, sources may be deterred from assisting the press in informing the public on matters of public interest. As a result, the vital “public watchdog” role of the press may be undermined. Any interference with the right to protection of journalistic sources (searches at journalists’ workplace or home, seizure of journalistic material, disclosure orders etc) that could lead to their identification must be backed up by effective legal procedural safeguards commensurate with the importance of the principle at stake. First and foremost among these safeguards is the guarantee of a review by an independent and impartial body to prevent unnecessary access to information capable of disclosing the sources’ identity. Such a review is preventive in nature. The review body has to be in a position to weigh up the potential risks and respective interests prior to any disclosure. Its decision should be governed by clear criteria, including as to whether less intrusive measures would suffice. The disclosure orders placed on journalists have a detrimental impact not only on their sources, whose identity may be revealed, but also on the newspaper against which the order is directed, whose reputation may be negatively affected in the eyes of future potential sources by the disclosure, and on the members of the public, who have an interest in receiving information imparted through anonymous sources and who are also potential sources themselves.
    [Show full text]
  • The Historian-Filmmaker's Dilemma: Historical Documentaries in Sweden in the Era of Häger and Villius
    ACTA UNIVERSITATIS UPSALIENSIS Studia Historica Upsaliensia 210 Utgivna av Historiska institutionen vid Uppsala universitet genom Torkel Jansson, Jan Lindegren och Maria Ågren 1 2 David Ludvigsson The Historian-Filmmaker’s Dilemma Historical Documentaries in Sweden in the Era of Häger and Villius 3 Dissertation in History for the Degree of Doctor of Philosophy presented at Uppsala University in 2003 ABSTRACT Ludvigsson, David, 2003: The Historian-Filmmaker’s Dilemma. Historical Documentaries in Sweden in the Era of Häger and Villius. Written in English. Acta Universitatis Upsalien- sis. Studia Historica Upsaliensia 210. (411 pages). Uppsala 2003. ISSN 0081-6531. ISBN 91-554-5782-7. This dissertation investigates how history is used in historical documentary films, and ar- gues that the maker of such films constantly negotiates between cognitive, moral, and aes- thetic demands. In support of this contention a number of historical documentaries by Swedish historian-filmmakers Olle Häger and Hans Villius are discussed. Other historical documentaries supply additional examples. The analyses take into account both the produc- tion process and the representations themselves. The history culture and the social field of history production together form the conceptual framework for the study, and one of the aims is to analyse the role of professional historians in public life. The analyses show that different considerations compete and work together in the case of all documentaries, and figure at all stages of pre-production, production, and post-produc- tion. But different considerations have particular inuence at different stages in the produc- tion process and thus they are more or less important depending on where in the process the producer puts his emphasis on them.
    [Show full text]