ChatkontrolleBundesregierung löchert EU-Kommission mit kritischen Fragen

61 teils sehr pointierte Rückfragen zur Chatkontrolle hat die Bundesregierung an die EU-Kommission. Überzeugende Antworten dürften der Kommission da schwerfallen. Wir veröffentlichen den Fragenkatalog im Volltext.

Nancy Faeser mit Handy
Die Bundesregierung hat Gesprächsbedarf mit der EU-Kommission. Im Bild: Innenministerin Nancy Faeser. – Alle Rechte vorbehalten IMAGO / IPON

Die Bundesregierung hat der EU-Kommission einen langen Fragenkatalog zum Gesetzesvorhaben der Chatkontrolle geschickt. Die Chatkontrolle ist ein Gesetzesvorhaben, mit dem die EU-Kommission Darstellungen von sexueller Gewalt gegen Kinder im Internet bekämpfen möchte. Das Vorhaben steht aber als neue und uferlose Form anlassloser Massenüberwachung massiv in der Kritik, auch bei Vertreter:innen der regierenden FDP und Grünen. Lediglich die SPD und Bundesinnenministerin Nancy Faeser äußerten sich bislang ambivalent.

Im Dokument, das wir im Volltext veröffentlichen, betont die Bundesregierung, dass sie das Vorhaben als wichtigen Schritt im Kampf gegen Kindesmissbrauch begrüße, aber vor dem Hintergrund ihres Koalitionsvertrages prüfe. Es ist die erste schriftliche inhaltliche Äußerung der Bundesregierung zur Chatkontrolle, die bekannt ist.

Laut dem Koalitionsvertrag seien die Unverletzlichkeit der Kommunikation, ein hohes Datenschutzniveau, ein hohes Maß an IT-Sicherheit sowie eine flächendeckende Ende-zu-Ende-Verschlüsselung für Deutschland unerlässlich, heißt es im Einleitungstext vor den Fragen. Der Koalitionsvertrag spreche sich gegen allgemeine Überwachungsmaßnahmen und Maßnahmen zur Durchleuchtung privater Kommunikation aus, heißt es dort weiter. Tatsächlich ist der Koalitionsvertrag noch strikter formuliert und lehnt diese Maßnahmen ab.

61 kritische Fragen

Danach stellt die Bundesregierung 61 Fragen an die EU-Kommission. Die haben es in sich und dürften die Kommission in Teilen vor ernsthafte Probleme stellen. Etwa, wenn die Bundesregierung fragt, ob der Hinweis auf die Wichtigkeit von Ende-zu-Ende-Verschlüsselung im Text auch heiße, dass diese Verschlüsselung auch nicht untergraben werden dürfe bei der Detektion von Darstellungen sexueller Gewalt. Oder wenn die Regierung fragt, wie hoch denn der Anteil falsch-positiver Treffer sein werde. Oder wenn sie nachhakt, ob die Software denn so gebaut werden könne, dass sie Kinder in nicht-missbräuchlichen Situationen von welchen in Missbrauchssituationen unterscheiden könne.

In weiteren Fragen heißt es, wie denn die Altersverifikation in den App-Stores geregelt sein solle oder wie die Chatkontrolle mit bestimmten Regelungen der Datenschutzgrundverordnung vereinbar sei. Die Bundesregierung fragt sogar, wie das Gesetz den feststellen könne, ob die Technologie nicht missbraucht würde und wie sie einen Missbrauch überhaupt feststellen wolle.

Insgesamt stellt die Bundesregierung hier treffende, kritischen Fragen und es ist zu erwarten, dass die EU-Kommission aufgrund der Fülle und Detailtiefe dieser Fragen und der massiven Grundrechtsverletzungen durch die Chatkontrolle, diese Fragen nur unzufriedenstellend beantworten kann. An der Bundesregierung liegt es dann, ob sie aus unzureichenden Antworten auch den Schluss zieht, die Chatkontrolle zu verhindern: mit dem politischen Gewicht Deutschlands und einer Blockade im Rat.


  • Datum: 10.06.2022
  • Von: Bundesregierung
  • Dokument: 206/2022

German questions on COM Proposal for a regulation of the European Parliament and of the council laying down rules to prevent and combat child sexual abuse

GER thanks COM for the initiative and welcomes COM’s effort to prevent and combat child sexual abuse. This is also an objective of the coalition treaty. The CSA draft regulation is an important step towards fighting child sexual abuse in the digital space on a European level and reaching better protection for children.

A common legislation including risk assessment, risk mitigation, risk reporting, clear legal basis and a new European Centre may help strengthening prevention and prosecution of child sexual abuse throughout the EU – while recognizing existing structures of content reporting services.

The confidentiality of communications is an important asset in our liberal societies that must be protected. Based on the Charta of Fundamental Rights, everyone has the right to respect for his or her private and family life, home and communications. All regulatory measures must be proportionate, should not go beyond what is necessary to prevent child sexual abuse in the digital space, and must effectively balance the conflicting interests of protecting children from abuse on the one hand and protecting privacy on the other.

GER will contribute to find clear appropriate and permanent ways for measures to help strengthening prevention and prosecution of child sexual abuse throughout the EU. According to GER’s coalition treaty secrecy of communication, a high level of data protection, a high level of Cybersecurity as well as universal end-to-end-encryption is essential for GER. The GER coalition treaty opposes general monitoring measures and measures for the scanning of private communications. GER is reviewing the draft proposal in the light of the coalition treaty. For GER it is important that regulation fighting against and preventing the dissemination of child sexual abuse material is in line with our constitutional standards of protection for private and confidential communication.

Regarding the establishment of an EU Centre the EU strategy had a rather comprehensive approach in mind addressing both online and offline prevention. The current proposal appears to primarily support law enforcement activities, while having no explicit mandate for offline prevention measures. From our view, the EU-Centre should additionally be a hub for awareness raising measures and the support of networks (incl. networks of survivors of child sexual abuse). We are convinced that the EU Centre should focus in particular on the prevention of online CSA. However, within the scope of its competence, it should also focus on offline CSA, when online offenses are associated with offline violence. Additionally GER advises to implement an equal structure of active participation of those affected by CSA from the beginning in the design of the EU-Centre. The EU Centre aims to provide support for those affected by CSA. However, the current proposal does not provide information concerning the participation of those affected by CSA in the EU-Centre.

Notwithstanding these substantive comments, we are still examining the current proposal to establish the EU Centre as an independent agency.

Our scrutiny reservation includes also but not only the organizational design of a new European Centre, Article 4, and – very generally speaking – the balancing between fundamental rights especially regarding the confidentiality of communication and end-to-end encryption.

GER would very much welcome the possibility of holding technical expert workshops alongside LEWP. Technical workshops would give MS the opportunity to learn more about the technologies at stake regarding detection orders and help improving a common understanding within MS.

We are intensively reviewing the draft regulation and will further comment on it. At this point GER has numerous questions. We would like to thank the Presidency and COM for the opportunity to transmit our questions and initial observations.

GER kindly asks for clarification regarding the following questions. At this point GER priority lies in the following questions:

1. How does EU CSA support the prevention of offline child sexual abuse? Besides the right for information and deletion of CSAM – what supporting measures are planned for victims and survivors of child sexual abuse?

2. Could the COM please give examples of possible mitigation measures regarding the dissemination of CSAM as well as grooming that are suitable for preventing a detection order?

3. Could the COM please explain how age verification by providers respectively App Stores shall be designed? What kind of information should be provided by a user? With regard to grooming your proposal specifically aims at communication with a child user. Shall the identification of a child user be conducted only via age verification? If a risk has been detected will providers be obliged to implanting user registration and age verification? Will there be also a verification to identify adult users misusing apps designed for children?

4. Does the COM share the view that recital 26 indicating that the use of end-to-end-encryption technology is an important tool to guarantee the security and confidentiality of the communications of users means that technologies used to detect child abuse shall not undermine end-to-end-encryption?

5. Could the COM please describe in detail on technology that does not break end-to-end-encryption, protect the terminal equipment and can still detect CSAM? Are there any technical or legal boundaries (existing or future) for using technologies to detect online child sexual abuse?

6. What kind of (technological) measures does COM consider necessary for providers of hosting services and providers of interpersonal communication in the course of risk assessment? Especially how can a provider conduct a risk assessment without applying technology referred to in Articles 7 and 10? How can these providers fulfill the obligation if their service is end-to-end encrypted?

7. How mature are state-of-the-art technologies to avoid false positive hits? What proportion of false positive hits can be expected when technologies are used to detect grooming? In order to reduce false positive hits, does COM deem it necessary to stipulate that hits are only disclosed if the method meets certain parameters (e.g., a hit probability of 99.9% that the content in question is appropriate)?

8. Does the proposal establish a legal basis for the processing of personal data for providers in the context of a detection order within the meaning of Article 6 GDPR? Does the proposal establish a legal basis for the processing of personal data for the EU-Centre in the context of a detection order within the meaning of regulation 2018/1725?

Additionally we would already like to raise the following questions:

Risk-assessment and risk mitigation:

9. Can COM detail on relevant „data samples“ and the practical scope of risk assessing obligations? Especially differentiating between providers of hosting services and providers of interpersonal communications services.

10. Can COM confirm that providers voluntary search for CSAM remains (legally) possible? Are there plans to extend the interim regulation, which allows providers to search for CSAM?

11. In Art. 3 par. 2 (e) ii the proposal describes features which are typical for social media platforms. Can COM please describe scenarios in which for those platforms a risk analysis does not come to a positive result?

Regarding detection orders:

12. Recital 23 states that detection orders should – if possible – be limited to an identifiable part of the service e.g. to specific users or user groups. Could COM please clarify how specific users/user groups shall be identified and in which scenarios a detection order should only be issued addressing a specific user/user groups?

13. Are the requirements set out in article 7 para 5 / para 6 / para 7 to be understood cumulatively?

14. Can COM please clarify „evidence of a significant risk“? Is it sufficient that there are more child users on the platforms and that they communicate to the extent described in Article 3?

15. How detailed does the detection order specify the technical measure required of the provider?

16. Can COM please clarify on the requirements of para 5b, 6a, 7b – which standard of review is applied? How can the likelihood in Art. 7 par 7 (b) be measured? Does the principle in dubio pro reo apply in favor of the hosting service?

17. How are the reasons for issuing the identification order weighed against the rights and legitimate interests of all parties concerned under Article 7(4)(b)? Is this based on a concrete measure or abstract?

18. Has COM yet received feedback by the providers, especially regarding article 7? If so, can you please elaborate the general feedback?

19. How concretely does the identification order specify the measure required of the provider? What follows in this respect from Article 7(8) („shall target and specify [the detection order]“), what from Article 10(2) („The provider shall not be required to use any specific technology“)?

20. On page 10 of the proposal it says „Obligations to detect online child sexual abuse are preferable to dependence on voluntary actions by providers, not only because those actions to date have proven insufficient to effectively fight against online child sexual abuse(…)“ What is COMs evidence proving that these voluntary options are insufficient?

21. How does the draft regulation relate to the rights of data subjects under Art. 12 et seq. of the GDPR, in particular Article 22 GDPR?

22. Regarding data protection supervisory authorities existing tasks under GDPR and other existing or currently negotiated European Acts (such as the DSA) how can effective control of identification orders be reached?

23. Does „all parties affected“ in Art. 9 include users who have disseminated CSAM or solicited children but who were nevertheless checked?

Technologies

24. Which technologies can be used in principle? Does Microsoft Photo ID meet the requirements?

25. Should technologies used in relation to cloud services also enable access to encrypted content?

26. How is the quality of the technologies assured or validated? How does the CSA proposal relate to the draft AI-Act?

27. How is the equivalence of providers‘ own technologies to be assessed under Article 10(2) and how does this relate to providers‘ ability to invoke trade secrets?

28. Can the technology be designed to differentiate between pictures of children in a normal/ not abusive setting (e.g. at the beach) and CSAM?

29. Can text analysis software differentiate a legitimate conversation between adults (parents, relatives, teachers, sport coaches, friends etc) and children from a grooming situation?

30. How do you want to ensure that providers solely use the technology – especially the one offered by the EU Centre – for executing the detection order?

31. How would we handle an error? How should eventual cases of misuse be detected?

32. Could you please elaborate on the human oversight and how it can prevent errors by the technologies used?

33. How do you expect providers to inform users on „the impact on the confidentiality of users‘ communication“? Is it a duty due to the issuance of a detection order? Or may it be a part of the terms and conditions?

34. Do provider of file/image-hosting, which do not have access to the content they store fall under the scope of the Regulation?

Further provider obligations

35. How do reporting obligations under this proposal relate to current NCMEC reporting? How can the two processes best be streamlined? How can be assured that neither a duplication of reports nor a loss of reports is taking place?

36. Which role should the Coordinating Authority play regarding reporting obligation?

37. Regarding a EU-wide removal of CSAM how does COM deal with national differences regarding criminal law?

38. What number of cases does COM expect for the reports to EU CSA? How many cases will be forwarded to the competent national law enforcement authorities and/or Europol?

39. Will the right to an effective redress be affected by the obligation under art. 14 to execute a removal order within 24 hours?

40. At what point can knowledge of the content be assumed to have been obtained by the provider, is human knowledge required?

41. What standard of review does COM assume with regard to the various „actors“ in the information chain in the process of issuing an order? Does this include the requirement for a human assessment/audit in each case?

42. Why should Europol be involved in all cases, i.e. not only in cases of unclear MS responsibility?

43. How can blocking orders be limited in practice to specific content or areas of a service, or can only access to the service as a whole be blocked?

44. Do cloud services have to block access to encrypted content if they receive a suspicious activity report about specific users?

Penalties

45. Why did you choose a latitude of judgment regarding penalties?

46. Does Art. 35 apply to cases of misuse of technology or the omission to establish effective measures to prevent such misuse (Art. 10 para 4)?

47. Why doesn’t the proposal follow the sanctions set out in TCO Regulation?

48. Could Article 35(2) be limited to breaches of a central obligation or a small number of central obligations?

Information-sharing systems

49. Article 39 (2) does not provide for the national law enforcement authorities to be directly connected to the information exchange systems. In which way will reports be passed on to national LEAs?

50. What shall the information-sharing system embrace? How can effectiveness and data protection best be balanced?

51. Only EU CSA and Europol will have direct access to the database of indicators (Art 46(5)), how can national LEAs/national coordinating authorities best participate of the information? Does COM consider a new interface necessary in order to let national authorities know that further information might be available?

EU CSA & Europol

52. With regards to the proposed EU Centre’s cooperation with Europol, how does the Commission envision the distribution of tasks between the two entities in concrete terms in order to assure that any duplication of effort is avoided?

53. We took notice that the Commission’s impact assessment does not examine further the possibility of integrating the tasks of prevention and victim support into FRA and the tasks with relevance for law enforcement into Europol instead of creating a new entity. Rather, it seems that this possibility is discarded after preliminary examination. We would therefore like to know why this option was not examined further in the first place? Moreover, we kindly ask COM to explain the advantages its expects from creating a new entity instead of allocating the tasks to FRA and Europol in combination?

54. The legislative proposal foresees that Europol should provide certain „support services“ to EU CSA. What are the concrete means and services EU CSA should draw on at Europol? How can those support tasks be demarcated from the tasks of EU CSA? In that context we would like to ask if and if yes, how many additional resources COM estimates for Europol?

55. How should Europol handle this support in terms of resources and how does COM ensure that such support would not come at the expense of Europol’s other tasks?

56. How can the proposed governance structure of EU CSA best be streamlined with Europol’s governance structure making sure that no misbalance between the Commission and Member states is created?

57. Article 53(2) of the draft deals with mutual access to relevant information and information systems in relation to Europol. Are we right in assuming that the provision does not regulate access to information as such, because reference is made to the relevant provisions („in accordance with the acts of Union law regulating such access“)? What then is the specific regulatory content of the provision? Please explain.

58. For which period does COM estimate that EU CSA can start its work (while maybe not yet being fully operational)?

59. At what stage of the process are images deleted according to the proposal?

60. According to Article 64(4)(h), the Executive Director of EU CSA to be established may impose financial penalties if there are criminal acts detrimental to the financial resources of the Union. How does this relate to EPPO proceedings?

61. How can the proposal ensure that the competences of EU CSA do not collide with the competences of Eurojust?

Mehr Zeit für kritische Berichterstattung

Ihr kennt es: Zum Jahresende stehen wir traditionell vor einer sehr großen Finanzierungslücke und auch wenn die Planung und Umsetzung unseres Spendenendspurts viel Spaß macht, bindet es doch sehr viele Ressourcen; Ressourcen, die an anderer Stelle für unsere wichtige Arbeit fehlen. Um Euch also weniger mit Spendenaufrufen auf die Nerven zu gehen und mehr Recherchen und Hintergründe bieten zu können, brauchen wir Eure regelmäßige Unterstützung.

Jährlich eine Stunde netzpolitik.org finanzieren

Das Jahr hat 8.760 Stunden. Das sind 8.760 Stunden freier Zugang zu kritischer Berichterstattung und wichtigen Fragestellungen rund um Internet, Gesellschaft und Politik bei netzpolitik.org.

Werde Teil unserer Unterstützungs-Community und finanziere jährlich eine von 8.760 Stunden netzpolitik.org oder eben fünf Minuten im Monat.

Jetzt spenden


Jetzt spenden

5 Ergänzungen

  1. Wann kann man denn mit Antworten rechnen? (Gibt es Erfahrungswerte? Oder ist irgendwo im bürokratischen Protokoll eine Frist festgeschrieben? Oder muss man einfach davon ausgehen, dass die Antworten noch vor der Abstimmung kommen?)

  2. Unsere Bundesregierung?!
    Ich kann nicht glauben was ich lese.
    Das ist gefühlt das erste Mal, dass ich sehe,
    dass unsere Regierung ihren Job macht.

    Das ist ja schon proaktiv statt reaktiv.
    Also bevor der Kram wieder vom Verfassungsgerichtshof oder dem EUGH gekippt wird.
    (hust **Vorratsdatenspeicherung** hust)

    @Anonymous (Erster Post)
    Und tschüss Euphorie :(
    Hab mal gegoogelt.
    So wie es aussieht können wir hier lange warten.

    […] The European Parliament’s Rules of Procedure also stipulate that the Commission must answer
    priority questions within three weeks and non-priority questions within six weeks […]
    […] the Commission often fails to respect the deadlines for answering questions and even misses them by several months […]

    Quelle:
    https://www.europarl.europa.eu/doceo/document/E-8-2016-009136_EN.html

    Ich denke jedoch, dass die Anfrage einer Regierung bei der EU einen höheren Stellenwert hat,
    als sagen wir der eines Vereins oder einer Organisation.
    Wir dürfen also immernoch hoffen.

  3. Vielleicht hat ja die entsprechende Markus-Lanz-Sendung da mit einen Anstoß gegeben. Ich feier manche Talkshows mittlerweile schon ein bisschen. Sehr nice also auch von Linus Neumann, dasser das macht.

    1. Danke für den Hinweis zur Lanz-Show. Sie hat mir das Herz geöffnet, den Blick auf die Opfer zu richten und auf konstruktive Vorgehen zu hoffen. Allzu leicht fällt es mir als Nicht-Betroffener und Herumdümpeler in der eigenen Suppe die Vorhaben reflexartig als Überwachungsmaschine in the making abzutun. Möge Faeser Erfolg haben und den rechtstaatlichen Prinzipien treu bleiben.

  4. Mal eine Anmerkung zur Form des Schreibens:
    Das Englisch kommt mir sehr holprig vor. Sind wir sicher, dass das ein offizielles Schreiben ist, das von offizieller Stelle mit offiziellen, fähigen Übersetzern erstellt wurde? So etwas wie ein durchgekoppeltes „image-hosting“ schreit förmlich „Deutsche, die sich an Englisch versuchen“. Hmmm.

Wir freuen uns auf Deine Anmerkungen, Fragen, Korrekturen und inhaltlichen Ergänzungen zum Artikel. Bitte keine reinen Meinungsbeiträge! Unsere Regeln zur Veröffentlichung von Ergänzungen findest Du unter netzpolitik.org/kommentare. Deine E-Mail-Adresse wird nicht veröffentlicht.