{"id":22766,"date":"2021-06-03T10:45:32","date_gmt":"2021-06-03T08:45:32","guid":{"rendered":"https:\/\/afteegypt.org\/?p=22766"},"modified":"2021-06-03T13:56:44","modified_gmt":"2021-06-03T11:56:44","slug":"internet-without-surveillance-how-can-the-egyptian-government-end-the-policy-of-mass-surveillance","status":"publish","type":"post","link":"https:\/\/afteegypt.org\/en\/research-en\/policy-papers-en\/2021\/06\/03\/22766-afteegypt.html","title":{"rendered":"Internet without surveillance .. How can the Egyptian government end the policy of mass surveillance?"},"content":{"rendered":"

 <\/p>\n

Prepared and written by Research Unit in the Association for Freedom of Thought & Expression<\/strong><\/span><\/div>\n

Executive summary<\/strong><\/span><\/h3>\n

When the newly-elected parliament started its sessions in 2015, its Communications Committee paid due attention to passing laws to regulate the use of cyberspace. Subsequently, the Law on Combating Information Technology Crimes No. 175 of 2018 and the Personal Data Protection Law No. 151 of 2020 were passed. These laws have contributed to strengthening surveillance practices. Nevertheless, the monitoring of online activities, such as emails, surfing the internet, phone conversations, and social media, has been practiced for many years, even before the two laws were passed. This helps us understand the context in which these laws were passed. The Egyptian government adopts a policy of random mass surveillance, as evidenced by the fact that the security services arrested lots of internet users after monitoring their online activities. The Egyptian authorities can stop these practices by introducing legislative amendments and stopping the illegal practices of security services, including the purchase of spyware.<\/p>\n

Introduction<\/strong><\/span><\/h3>\n

Ten years after the 25 January revolution, during which internet services were cut off all over Egypt, according to Article 67 of the Telecommunication Regulation Law No. 10 of 2003, the government \u2013 especially the security services \u2013 is still imposing mass surveillance on the internet, thus breaching public and private privacies in the digital sphere. These practices have been practiced over the years, based on specific legal texts or completely outside the framework of law. This comes as the internet has been increasingly used as a last window for expressing opinions about public affairs. According to the summary report on communications and information technology indicators issued by the Ministry of Communications, the number of internet users in Egypt reached 62.3 million by the end of September 2020.<\/p>\n

In this context, the paper discusses the Egyptian government\u2019s policy in monitoring internet users, in light of laws that the security agencies use to control user data. When the Personal Data Protection Law No. 151 of 2020 was passed, debate surfaced again as to how to protect citizens\u2019 digital privacy, especially as the law aims primarily to protect user data. The paper analyzes the Egyptian government\u2019s practices and the extent of their relevance to a public policy that relies on the use of surveillance to protect security and enhance stability, and the implications of that policy on internet users in Egypt, in addition to its negative impact on investment.<\/p>\n

This policy can be changed by stopping the monitoring of internet users and enhancing the rule of law, thus paving the way for more investments and enabling citizens to engage in public debates. In the meantime, the top priority should be given to the protection of user data and the provision of services to the public.<\/p>\n

Background .. How has everyone become monitored?<\/strong><\/span><\/h3>\n

The policy of mass surveillance depends on the purchase of spyware, in addition to passing laws that allow the security services to monitor and arrest users. In 2013, the Egyptian authorities purchased proxySG software from the American company Blue Coat Systems, which uses the \u201cdeep packet inspection\u201d technology. This software enables telecom service providers to know a lot about user behaviours, such as geolocation and tracking. It monitors and filters internet content en masse[1]<\/sup><\/a>. In the same year, the Ministry of Interior announced Decision No. 22 of 2013\/2014 on limited practice, under the name “Public Opinion Measurement System”, through which a tender was conducted to supply and operate software aimed at monitoring the cyberspace.<\/p>\n

In response to this, several human rights organizations filed a lawsuit in 2014 before the Administrative Judiciary Court to revoke the Ministry of Interior’s decision regarding limited practice[2]<\/sup><\/a>. The lawsuit was rejected in 2017 for reasons related to the lack of link between the plaintiffs and the contested contract. Therefore, the court rejected the case in form, without addressing the importance of its content which is related to the privacy of citizens.[3]<\/sup><\/a><\/p>\n

In 2017, the United Arab Emirates purchased the Cerebro spyware and provided it to the Egyptian government. This software, which uses the deep packet inspection technology, enables the Egyptian authorities to comprehensively monitor communications, including voice calls, text messages, emails, instant messages, various social media platforms, and search engines.[4]<\/sup><\/a><\/p>\n

The Ministry of Interior\u2019s affiliates, such as the General Administration of Information Technology[5]<\/sup><\/a>, in coordination with the National Security Agency, monitor social media users. There have been increasing arrests for reasons related to sharing content, writing a comment, liking a post, or managing a page on social media. AFTE documented at least 300 of such arrests during the period from the second half of 2013 until the first quarter of 2021. Moreover, the Public Prosecution, which is part of the judiciary, has created a unit to monitor social media users.<\/p>\n

Mass surveillance of social media makes users afraid of visiting certain websites or expressing their opinions, which creates a state of self-censorship over what users could write or like. This applies to users\u2019 accounts on Facebook, Twitter, Instagram, and TikTok, after it was limited to private messages.<\/p>\n

As a result of surveillance and the absence of legal guarantees to protect the right to privacy, users sometimes resort to technical tools that enable them to enjoy privacy and communicate securely over the internet. They, however, might be referred to prosecutions because of this, as the Telecommunication Regulation Law criminalizes the use of encryption tools either by service providers or by users.[6]<\/sup><\/a><\/p>\n

It should be noted that all electronic means, from emails to social media, use encryption protocols to transfer data[7]<\/sup><\/a>, which means that the legislator is confused about concepts. However, this article can be understood in the context of the authorities\u2019 endeavours to block websites that provide VPN services, as they blocked the \u201ci2p\u201d and \u201cfree internet\u201d websites that provide anonymity to internet users.<\/p>\n

The Egyptian authorities, moreover, have tried to block encrypted private chat applications, such as Signal. On 16 December 2016, the authorities tried to block Signal, and the application tweeted: “We\u2019ve been investigating over the weekend, and have confirmed that Egypt is censoring access to Signal.”[8]<\/sup><\/a><\/p>\n

These practices are based on a general policy adopted by the Egyptian authorities to consider surveillance as a tool to protect national security, without being bound by respect for human rights and the rule of law. This policy affects Egypt\u2019s international relations. For example, the German police in 2017[9]<\/sup><\/a> cancelled a training course for the Egyptian police on monitoring extremist websites for fear that the latter would use it to monitor Egyptians. It, moreover, affects international companies operating in Egypt, which may be exposed to pressure to share their users’ data with the Egyptian authorities.<\/p>\n

From among several alternatives, ending the policy of mass surveillance is the best solution<\/strong><\/span><\/h3>\n

The Egyptian government still prefers to use mass surveillance, technology, legislation, and security services in order to achieve its goal. The development of surveillance technologies has enhanced the government’s ability to collectively monitor communications and online activities. According to a digital security expert, highly-sophisticated artificial intelligence software is used to analyse patterns and language, which means that huge user data is collected and analysed to help determine users\u2019 interests and political orientations based on the pages they use.[10]<\/sup><\/a><\/p>\n

Since these practices govern the laws that followed, the Law on Combating Information Technology Crimes allows the government to obtain user data from telecommunication companies and store it for six months. Therefore, the government uses the legislation to maintain mass surveillance[11]<\/sup><\/a>, thus enhancing its capabilities to impose comprehensive monitoring measures[12]<\/sup><\/a>. This is backed by the state’s ownership of the telecommunication infrastructure and the central administration of this vital sector[13]<\/sup><\/a>. The transparency report of Vodafone Egypt in the United Kingdom, before it was sold to Saudi STC, stated that the company could not disclose any information related to its business in Egypt, otherwise its license would be revoked.[14]<\/sup><\/a><\/p>\n

Some lawmakers and experts may advocate a somewhat different policy that avoids user monitoring and focuses only on the protection of personal data, in order to provide an attractive investment climate. This trend has emerged when the Personal Data Protection Law was passed. The government announced that one of the key objectives of the law is to create a legislative climate that encourages investment in the giant data center industry[15]<\/sup><\/a>, and to raise Egypt’s ranking in the human rights index[16]<\/sup><\/a>, without taking any measures regarding the monitoring practices carried out by executive and security agencies.<\/p>\n

It was expected that the law would regulate the process of using and sharing data, and protect users from violating their privacy by multiple parties. However, the law excluded national security agencies and entities subject to the Central Bank from the provisions of the law[17]<\/sup><\/a>, which negates the law’s primary objective of protecting data privacy. In addition, the executive regulations of the law have not yet been issued, which raises concerns about the investment climate, especially as a number of international companies, such as Google and Microsoft, expressed concerns about the law at the time of its discussion[18]<\/sup><\/a>. This approach, moreover, does not show ways to deal with the purchase of spyware and the monitoring of internet users by government agencies.<\/p>\n

We suggest that the Egyptian government adopt a policy based on an immediate halt to surveillance and a commitment to privacy protection. The government should stop using or purchasing spyware, and introduce legislative amendments, by launching an extensive discussion with telecom experts, companies, and civil society organizations, in order to determine the destination and goals of these laws. It should also provide stronger guarantees to protect the users\u2019 right to privacy, to ensure that the control imposed on internet and telecommunication service providers is stopped, and that the security services comply with the law.<\/p>\n

This policy would provide legal ways to deal with any threats to national security and rein in the security services that infringe on citizens’ privacy, thus enhancing political and social stability. On the other hand, the introduction of legislative amendments that prevent monitoring practices would encourage investors and major companies to work in Egypt. This policy would also allow the Egyptian government to boost its international relations by strengthening its commitment to the protection of privacy, thus giving more opportunities for cooperation and training with democratic countries.<\/p>\n

Recommendations<\/strong><\/span><\/h3>\n

AFTE believes that the Egyptian government can end the monitoring policy through several recommendations, which can be summarized as follows:<\/strong><\/p>\n