Clean IT Project
The Clean IT Project is an online project initiated by the European Union, aiming to reduce or discourage online terrorism and further illegal activities via the internet. They aim to create a document that commits the internet industry to help governments discover content that incites acts of terrorism. The main facilitators that undertook this project were the Netherlands, Germany, United Kingdom, Belgium, and Spain. There are many more supporting EU members such as Hungary, Romania, and recently, Italy, but the main countries that have started the project are the 5 listed above.
Objectives
As stated on the project website, the objectives of the Clean IT Project include:- The initiation of a public and private dialogue regarding illegal activities on the internet, especially focused on terrorist activities. The objective is to consider both the public and private interests of the Clean IT project so that both parties would have the proper motivation when engaging in it. Additionally, this aims to set a clear and shared understanding of what online terrorism is and the categories that it entails through a public and private dialogue.
- The creation of a general set of guidelines between the private and public sectors when managing online terrorist threats. This project's objective is not to set a strict legislative statement on online terrorism but to provide a set of guidelines and notions for both the government and the private corporations on online terrorism.
- The affirmation of a set of proceedings that eventually reduces the terrorists' influences on the internet. These proceedings are offered to the public and private sectors as guidelines, not necessarily a set of rules. Both parties may implement the indicated measures voluntarily to their own benefits.
History
Before the Internet was created, the transmittance of information between mediums was limited by distance. However, since modernization and constant development of this resource, we are now able to communicate with people across the world by a means of a couple clicks and keystrokes. While we have seen many benefits through the creation of the Internet, this extension of freedom has also led to many setbacks, which the Clean IT project strives to solve. Clean IT is particularly concerned with possible terrorist attacks. The ease of accessibility to reach individuals and corporations, harness large amounts of information, and manipulate systems can all be derived from this common source, and for these key reasons, Europe has made large strides in making their vision of clean Internet technology a reality.This project was drafted through an open dialogue between the private corporations and government agencies which started in June 2011 and had concluded in March 2013. This process involved 6 meetings in Amsterdam, Madrid, Brussels, Berlin, Utrecht, and Vienna, where a project team facilitated the conversation for Clean IT. This dialogue involved over 110 participants: representatives from both the government and private corporations as well as experts and academics in the related fields. Once a revision had been made on the document after every meeting, the document was released to the general public in order to consider their opinion as well. The final version of the document was released on 21 January 2013, which included a detailed analysis of online terrorist activities and nine general guidelines that suggest the best practices or ways to reduce online terrorism.
On their website they state that their goal is to "To start a constructive public-private dialogue about terrorist use of the Internet". To further elaborate, the Clean IT project has created a set of guidelines that would be supported by public and private parties, a code of conduct on how to deal with possible terrorist attacks online. The solution, they state, is made on a case-by-case basis with one basic principle that has upset many, "Any action taken to reduce the terrorist use of the Internet must comply with national and European laws and regulations, and respect fundamental rights and freedoms, including access to the Internet, freedoms of assembly and expression, privacy and data protection".
Partnerships and participants
Initial project partners
Supporting governmental partners
Governments/Ministries that joined the project:Other participants (civil society, industry, law enforcement and intelligence)
These persons or organizations attended Clean IT events and/or exchanged views to contribute to the project.- Guardia Civil
- Belgian Federal Police
- Bundesamt für Verfassungsschutz
- Bundeskriminalamt
- PET (Denmark)
- International Network Against Cyber Hate
- Ligue internationale contre le racisme et antisémitisme
- Association des Fournisseurs d'Acces et de Services Internet
- Internet Society Belgium
- Hosting company LeaseWeb
- Dutch computer end user organisation
- Pirate Party Switzerland
- Prof. Dr. Manuel R. Torres Soriano
- Ms Yuliya Morenets, representative of ’Together against Cybercrime’
- Asiem El Difraoui, Institut für Medien- und Kommunikationspolitik
- Euvision
- Atos Spain
- Special Telecommunications Service, Romania
- Hosting company Kosmozz
- International Association of Internet Hotlines
- N-Square Consulting
- S21Sec
- Community Security Trust
- Ronald Eissens, Magenta Foundation
- Dr Francesca Galli, Université Libre de Bruxelles
- Denis Ćoragić, Diplo Foundation
- ZyLAB
- Nico Prucha, Vienna University
- Rebecca Schindler, RAND Europe
- Luke Forsyth, CA Technologies
- Michael Hilberer, Piratenpartei Saarland
- Internautas Association
- Szubjektiv
- Jugendschutz
- Office of the EU Counter-Terrorism Coordinator
- Optenet
- Abusix
- United Nations Office on Drugs and Crime
- Dr. Maura Conway
- Crown Prosecution Service
- Christian Heutger
- Eddy Willems, G Data Software AG
- Korps Nationale Politie, Landelijke Eenheid
- Incopro
- KPN Security
Opposition
Many individuals fear that the actions of this project will continue to grow and possibly restrict use of the Internet. The project would require Internet users to use their real name in all online communication and punish individual for linking to "terrorist content", making no distinction between searching for educational or malicious purposes. Many activist groups and individuals are deeply concerned regarding the scope of the government's capabilities of keeping an eye on the general public. If the past is an indicator, the Clean IT project will see opposition if the Internet community bands together with a worldwide protest, such as one that was successfully able to kill ACTA. A recently leaked document has raised the concern that the initiative has drifted away from its initial aims of fighting the illegal activities and online terrorism. Their broad, vague and widespread approach to online security has arisen concern for internet freedom in addition to the project's dedication to defending the law. The leaked document reveals measures that would allow the removal of lawful content and several other factors including the implementation of blocking systems. There is also the issue of private corporations being involved in the equation of this agreement in the Clean IT project where their personal interests are also intervening with the issue.The leaked document includes the following proposals:
- Removal of any legislation preventing filtering/surveillance of employees' Internet connections
- Law enforcement authorities should be able to have content removed "without following the more labour-intensive and formal procedures for 'notice and action'”
- "Knowingly" providing links to "terrorist content" will be an offence "just like" the terrorist
- Legal underpinning of "real name" rules to prevent anonymous use of online services
- ISPs to be held liable for not making "reasonable" efforts to use technological surveillance to identify "terrorist" use of the Internet
- Companies providing end-user filtering systems and their customers should be liable for failing to report "illegal" activity identified by the filter
- Customers should also be held liable for "knowingly" sending a report of content which is not illegal
- Governments should use the helpfulness of ISPs as a criterion for awarding public contracts
- The proposal on blocking lists contradict each other, on the one hand providing comprehensive details for each piece of illegal content and judicial references, but then saying that the owner can appeal and that filtering such be based on the "output" of the proposed content regulation body, the "European Advisory Foundation"
- Blocking or "warning" systems should be implemented by social media platforms – somehow it will be both illegal to provide "Internet services" to "terrorist persons" and legal to knowingly provide access to illegal content, while "warning" the end-user that they are accessing illegal content
- The anonymity of individuals reporting illegal content must be preserved... yet their IP address must be logged to permit them to be prosecuted if it is suspected that they are reporting legal content deliberately and to permit reliable informants' reports to be processed more quickly
- Companies should implement upload filters to monitor uploaded content to make sure that content that is removed – or content that is similar to what is removed – is not re-uploaded
- It proposes that content should not be removed in all cases but "blocked" and, in other cases, left available online but with the domain name removed.