43 votes

Criminalization of encryption: The 8 December case

13 comments

  1. lux
    Link
    Ah the classic. It's always a coin flip between pedo or terrorist.

    Ah the classic. It's always a coin flip between pedo or terrorist.

    30 votes
  2. [9]
    FeminalPanda
    Link
    Ran it thru Google translate. This article was written on the basis of information relating to the so-called “December 8” case1 in which 7 people were indicted for “terrorist criminal association”...
    • Exemplary

    Ran it thru Google translate.

    This article was written on the basis of information relating to the so-called “December 8” case1 in which 7 people were indicted for “terrorist criminal association” in December 2020. Their trial is scheduled for October 2023 This will be the first anti-terrorism trial targeting the “ultra-left” since the Tarnac2 fiasco. The charge of terrorism is forcefully rejected by the accused. The latter denounce a political trial, an incriminating investigation and a lack of evidence. They point in particular to decontextualized remarks and the use of trivial facts (sports, digital practices, readings and music listened to, etc.)3.

    For their part, the police recognize that at the end of the investigation – and ten months of intensive surveillance – no “specific project” has been identified4. The State has just been sentenced for keeping the main accused in solitary confinement for 16 months and from which he was only released after a 37-day hunger strike. A second complaint, pending judgment, was filed against the illegal and repeated strip searches that an accused suffered in pre-trial detention5. Many personalities, media and collectives have given them their support6. It is in this context that we were alerted to the fact that, among the alleged facts (for an overall overview of the case, see the references in footnotes7), the digital practices of the accused, at first rank of which the use of encrypted messaging for the general public, are exploited as so many "proofs" of a so-called "clandestineness" which can only be explained by the existence of a terrorist project. We chose to denounce it. “All the members contacted adopted a clandestine behavior, with increased security of the means of communication (encrypted applications, Tails operating system, TOR protocol allowing anonymous browsing on the Internet and public wifi). " DGSI " All the members of this group were particularly suspicious, only communicated with each other through encrypted applications, in particular Signal, and proceeded to encrypt their computer media [...]. » Investigating magistrate These two sentences are emblematic of the attack carried out against the historic battles of La Quadrature du Net in the case of December 8, which are the right to encryption8 of communications9, the fight against the exploitation of personal data by the GAFAM10, the right to intimacy and private life as well as the dissemination and appropriation of computer knowledge11.

    Combining fantasies, bad faith and technical incompetence, the elements communicated to us reveal that a police story is built around the (good) digital practices of the accused for the purpose of staging a "clandestine small group" and "conspiratorial". Here are some of the digital habits that are, in this case, exploited as so many “proofs” of the existence of a criminal project12: – the use of applications such as Signal, WhatsApp, Wire, Silence or ProtonMail to encrypt its communications; – the use of tools to protect your privacy on the Internet such as a VPN, Tor or Tails; – protecting ourselves against the exploitation of our personal data by GAFAM via services such as /e/OS, LineageOS, F-Droid; – encryption of digital media; – the organization and participation in digital hygiene training sessions; – the mere possession of technical documentation. While digital technology has multiplied state surveillance capacities13, we denounce the fact that the technologies that allow everyone to restore a political balance that is more fragile than ever are associated with criminal behavior at large scale.

    15 votes
    1. [7]
      asterisk
      (edited )
      Link Parent
      You don't need to run thro Google translation; the top bar has a language switcher which leads to English version too. There're no about uBlock [or so fast search failed for me], but: This's...

      You don't need to run thro Google translation; the top bar has a language switcher which leads to English version too. There're no about uBlock [or so fast search failed for me], but:

      The elements of the investigation that have been communicated to us are staggering. Here are just some of the practices that are being misused as evidence of terrorist behavior⁶:

      • the use of applications such as Signal, WhatsApp, Wire, Silence or ProtonMail to encrypt communications ;
      • using Internet privacy tools such as VPN, Tor or Tails⁷;
      • protecting ourselves against the exploitation of our personal data by GAFAM via services such as /e/OS, LineageOS, F-Droid ;
      • encrypting digital media;
      • organizing and participating in digital hygiene training sessions;
      • simple possession of technical documentation.

      1. Among La Quadrature’s latest actions for the right to encryption and respect for privacy on the Internet, see in particular our intervention at the Constitutional Council against the obligation to give one’s decryption codes in 2018, against the terrorist censorship regulation adopted in 2021, our positions following the state attacks on end-to-end encryption in 2016/2017, or our collective complaint against GAFAM filed in 2018. See also our position during the Terrorism Bill in 2014 here and the Intelligence Act in 2015.
      2. Tor is a protocol for protecting Internet browsing by passing through a series of relays before accessing the Internet. It limits connection tracking and protects against censorship. It can be used on any computer. Tails is a consumer operating system, like Ubuntu/Windows, that can be installed on a USB stick. It enables secure browsing through automatic use of Tor, on any computer. This tool is recommended to ensure the benefits of using Tor and to limit the risks of cyberattacks. See also the Tails and Tor websites. You can download the Tor browser here.

      This's hilarious, yeah.

      30 votes
      1. [2]
        Tardigrade
        Link Parent
        I'd say it was hilarious if it didn't have the potential to be successful.

        I'd say it was hilarious if it didn't have the potential to be successful.

        16 votes
        1. asterisk
          Link Parent
          Yeah: funny if not sad.

          Yeah: funny if not sad.

          5 votes
      2. [3]
        Areldyb
        Link Parent
        Thanks for this, I had missed the English language option. Lazy link to the English-language article: https://www.laquadrature.net/en/2023/06/05/criminalization-of-encryption-the-8-december-case/...

        Thanks for this, I had missed the English language option.

        Lazy link to the English-language article:
        https://www.laquadrature.net/en/2023/06/05/criminalization-of-encryption-the-8-december-case/

        I also did not find any specific references to uBlock. Is it possible to edit the title and tags to remove that reference?

        9 votes
      3. FeminalPanda
        Link Parent
        Yeah, I read thru it and didn't see it either but the other stuff being demonized is bad as well.

        Yeah, I read thru it and didn't see it either but the other stuff being demonized is bad as well.

        1 vote
    2. Farshief
      Link Parent
      Thank you for running that for us. This reminds me of some USA police that I've seen where they'll act like being suspicious is a crime. There's nothing wrong with wanting your privacy protected.

      Thank you for running that for us.

      This reminds me of some USA police that I've seen where they'll act like being suspicious is a crime.

      There's nothing wrong with wanting your privacy protected.

      10 votes
  3. akrie_skillissue
    Link
    Wow, it's always been a hasty excuse on blanket banning privacy protections by claiming a small easily detectable minority. Fun fact: Getting away from malware, keylogging, or metadata collection...

    Wow, it's always been a hasty excuse on blanket banning privacy protections by claiming a small easily detectable minority. Fun fact: Getting away from malware, keylogging, or metadata collection does not immediately equate to breaking the law

    5 votes
  4. menthol_bidet
    Link
    Do the French have a law against civilians traveling to Syria to fight ISIS as mercenaries? Because that's what they appear to have been arrested for....

    Do the French have a law against civilians traveling to Syria to fight ISIS as mercenaries? Because that's what they appear to have been arrested for.

    https://en.m.wikipedia.org/wiki/8_December_2020_incident

    This article seems to indicate that there are some sort of laws against it.

    https://www.lepoint.fr/societe/ces-jeunes-partis-combattre-l-ei-en-syrie-qui-embarrassent-les-autorites-francaises-17-05-2019-2313158_23.php

  5. m0ntana
    Link
    and if you have a dick - you're a potential rapist

    and if you have a dick - you're a potential rapist

    3 votes