Office, Karriere und IT Blog

Office, Karriere und IT Blog

   
Anzeige

EU plans to expand chat control

The EU Commission, supported by European governments, is working quietly to lift digital mail secrecy. As part of the fight against child abuse, a regulation is to be passed that will require communication service providers to screen communication content for signs of child abuse or attempts by adults to attract children (so-called “grooming”). But that’s not all, the draft law should now also include the monitoring of audio communication!

chatkontrolle-EU

Topic Overview

Anzeige

User devices can be searched for images or content of potential child abuse should such an order be issued. This so-called client-side scanning (CSS) checks before a message is sent whether it contains a depiction of child abuse. Client-side scanning undermines the privacy of letters, which is protected by end-to-end encryption is guaranteed for communication services, since data is searched through before encryption without concrete suspicion. Apple had planned a similar process, despite opposition from recognized IT security researchers. In a study, they came to the conclusion that client-side scanning represents a threat to privacy, IT security, freedom of expression and overall democracy.

What is planned?

What is planned?

According to a survey by the Swedish Presidency, which was answered by 20 EU member states, many EU states want to expand the controversial plans for so-called chat control. Ten countries spoke out clearly in favor of monitoring audio communications in order to combat child sexual abuse. On the other hand, six countries, including Germany, expressed concerns and are more inclined to oppose this proposal. Seven Member States have not yet taken a position on this issue.

Controlling and monitoring these communication channels, also known as “chat control“, also presents a significant challenge. While text messages can be scanned for inappropriate or illegal content with relative ease, the Monitoring audio content is technically much more difficult, and error-prone.

How do the countries feel about the plans?

The current proposal by the EU Commission for the so-called CSAM regulation (Child Sexual Abuse Material) makes no fundamental distinction between different types of media. However, it is mainly images, videos and texts that are spoken of, not audio files. Article 13 states that abuse reports must include “all content data, including images, videos and text”. Here, texts mainly relate to attempts at sexual initiation (grooming), which are to be identified in the communication.

Croatia therefore argues:Audio communication can be used for grooming. It should be included in the CSAM proposal provided there are appropriate means of identifying grooming via audio communication.

However, Romania emphasizes the complexity of this task, since “audio files may not contain the same visual cues as images or videos“.

The Netherlands argues that monitoring audio communications “would be disproportionate to the intended purpose“. In addition, “in the case of end-to-end encrypted voice communications, it will most likely also require measures that are incompatible with the case law of the European Court of Justice on data retention“.

Ads

In Slovakia, interception of audio communications would “constitute the most serious interference with the fundamental rights of data subjects and an exception to the principle of confidentiality of communications” set out in the E-Privacy Directive is anchored. In addition, the relevant providers would hardly be able to create a necessary risk assessment, since the communication should not be monitored.

Spain explicitly states:Ideally, we would prefer it to be legislated that service providers based in the EU cannot use end-to-end encryption. An alternative would be transport encryption, similar to that used in most email communications, which could be searched by the provider on their servers. However, this approach is “very controversial”.

The German government has already announced that it has “considerable concerns about the provisions on disclosure orders provided for in the draft regulation”. A high level of data protection and cyber security, including complete and secure end-to-end encryption in electronic communications, is essential for the federal government. “For this reason, Germany considers it necessary, among other things, to emphasize in the draft that no techniques may be used that disrupt, weaken, circumvent or modify the encryption“, the statement continued.

Seven member countries, including France, Austria, Sweden and Portugal, have not yet commented. It is therefore currently uncertain whether the consideration of audio communication will be included in the Council of Ministers’ negotiating position. However, should this be the case, it could likely intensify resistance to overall chat control even further.

Mass surveillance by order

Mass surveillance by order

Per Disclosure Order should enable authorities to oblige online services to automatically check the content of their users systematically and impartially. For such an arrangement, there must be a “significant risk” that, for example, depictions of abuse are disseminated via the service. Critics fear that this term could potentially apply to any service through which users share content.

The German Lawyers’ Association (DAV) shares this view and believes that the provisions are “extremely vague and also so low-threshold that they can basically be applied to all hosting and communication services, especially social networks would be.

The DAV also notes that the associated obligation to evaluate communication content on a large scale would be incompatible with fundamental freedom rights, would represent a particularly serious encroachment on the confidentiality of communication and, in addition, all users of e-mail, chat and hosting services under general suspicion. There is a risk of significant “chilling effects“, i.e. self-censorship by EU citizens . In addition, interference with the relationship of trust with persons subject to professional secrecy such as lawyers, doctors and journalists could be feared.

This planned mass evaluation of communication content would also contradict the case law of the European Court of Justice (ECJ) in relation to data retention. The court has repeatedly declared excessively broad storage requirements to be unlawful.

The ECJ assessed the handling of traffic and location data. An inappropriate and mass evaluation of content, as envisaged in the current Commission draft, would go “far beyond the previously discussed measures of the data retention“, according to the statement of the DAV. The chances of the law surviving litigation would be correspondingly poor.

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.
Blogverzeichnis Bloggerei.de

Search by category:

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.
Blogverzeichnis Bloggerei.de

Search by category:

Popular Posts:

911, 2025

Microsoft Loop in Teams: The revolution of your notes?

November 9th, 2025|Categories: Microsoft Office, Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams, Microsoft Word, Office 365, Software|Tags: , , |

What exactly are these Loop components in Microsoft Teams? We'll show you how these "living mini-documents" can accelerate your teamwork. From dynamic agendas to shared, real-time checklists – discover practical use cases for your everyday work.

911, 2025

Career booster 2026: These Microsoft Office skills will take you further!

November 9th, 2025|Categories: Microsoft Office, Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams, Microsoft Word, Office 365, Software|Tags: , |

A new year, new career opportunities! But which Office skills will really be in demand in 2026? "Skilled use" is no longer enough. We'll show you today's must-haves – like advanced Excel, using AI in the office, and relevant certifications for your resume.

311, 2025

Why Zero Trust doesn’t work without identity protection!

November 3rd, 2025|Categories: Shorts & Tutorials, Artificial intelligence, AutoGPT, ChatGPT, Data Protection, Homeoffice, LLaMa, TruthGPT|Tags: , |

Zero Trust means: Trust no one, verify everyone. Identity protection is at the heart of this modern security model. Learn how IAM, MFA, Conditional Access, and the principle of least privilege effectively protect your business when the old network perimeter is gone.

211, 2025

How AI fuels cyberattacks – and how it protects us from them

November 2nd, 2025|Categories: Shorts & Tutorials, Artificial intelligence, AutoGPT, ChatGPT, Data Protection, Homeoffice, LLaMa, TruthGPT|Tags: , |

Cybercriminals are using AI for deepfakes and automated attacks. Defenses are also relying on AI: through behavioral analysis (UEBA) and automated responses (SOAR). Learn how this arms race works and how modern security strategies can protect your business.

211, 2025

Information overload: Protection & tips against digital stress

November 2nd, 2025|Categories: Shorts & Tutorials, Homeoffice|Tags: |

Constantly online, overwhelmed by news, emails & social media? Digital information overload leads to stress and concentration problems. Learn the best strategies and practical tips to effectively protect yourself, manage the chaos, and regain your focus.

111, 2025

Put an end to password chaos: Why a password manager is important

November 1st, 2025|Categories: Shorts & Tutorials, Data Protection, Google, Homeoffice, Software|Tags: , , , |

Passwords are constantly being stolen through data leaks. A password manager is your digital vault. It creates and stores strong, unique passwords for every service. This effectively protects you against identity theft through "credential stuffing".

Offers 2024: Word & Excel Templates

Popular Posts:

911, 2025

Microsoft Loop in Teams: The revolution of your notes?

November 9th, 2025|Categories: Microsoft Office, Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams, Microsoft Word, Office 365, Software|Tags: , , |

What exactly are these Loop components in Microsoft Teams? We'll show you how these "living mini-documents" can accelerate your teamwork. From dynamic agendas to shared, real-time checklists – discover practical use cases for your everyday work.

911, 2025

Career booster 2026: These Microsoft Office skills will take you further!

November 9th, 2025|Categories: Microsoft Office, Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams, Microsoft Word, Office 365, Software|Tags: , |

A new year, new career opportunities! But which Office skills will really be in demand in 2026? "Skilled use" is no longer enough. We'll show you today's must-haves – like advanced Excel, using AI in the office, and relevant certifications for your resume.

311, 2025

Why Zero Trust doesn’t work without identity protection!

November 3rd, 2025|Categories: Shorts & Tutorials, Artificial intelligence, AutoGPT, ChatGPT, Data Protection, Homeoffice, LLaMa, TruthGPT|Tags: , |

Zero Trust means: Trust no one, verify everyone. Identity protection is at the heart of this modern security model. Learn how IAM, MFA, Conditional Access, and the principle of least privilege effectively protect your business when the old network perimeter is gone.

211, 2025

How AI fuels cyberattacks – and how it protects us from them

November 2nd, 2025|Categories: Shorts & Tutorials, Artificial intelligence, AutoGPT, ChatGPT, Data Protection, Homeoffice, LLaMa, TruthGPT|Tags: , |

Cybercriminals are using AI for deepfakes and automated attacks. Defenses are also relying on AI: through behavioral analysis (UEBA) and automated responses (SOAR). Learn how this arms race works and how modern security strategies can protect your business.

211, 2025

Information overload: Protection & tips against digital stress

November 2nd, 2025|Categories: Shorts & Tutorials, Homeoffice|Tags: |

Constantly online, overwhelmed by news, emails & social media? Digital information overload leads to stress and concentration problems. Learn the best strategies and practical tips to effectively protect yourself, manage the chaos, and regain your focus.

111, 2025

Put an end to password chaos: Why a password manager is important

November 1st, 2025|Categories: Shorts & Tutorials, Data Protection, Google, Homeoffice, Software|Tags: , , , |

Passwords are constantly being stolen through data leaks. A password manager is your digital vault. It creates and stores strong, unique passwords for every service. This effectively protects you against identity theft through "credential stuffing".

Offers 2024: Word & Excel Templates

Ads

Popular Posts:

Search by category:

Autumn Specials:

Anzeige
Go to Top