Steamed Hams, Except It’s The EU Commission’s Alleged CSAM Regulation ‘Experts’

from the skepticism-proven-to-be-warranted dept

Everyone who wants client-side scanning to be a thing insists it’s a good idea with no potential downsides. The only hangup, they insist, is tech companies’ unwillingness to implement it. And by “implement,” I mean — in far too many cases — introducing deliberate (and exploitable!) weaknesses in end-to-end encryption.

End-to-end encryption only works if both ends are encrypted. Taking the encryption off one side to engage in content scanning makes it half of what it was. And if you get in the business of scanning users’ content for supposed child sexual abuse material (CSAM), governments may start asking you to “scan” for other stuff… like infringing content, terrorist stuff, people talking about crimes, stuff that contradicts the government’s narratives, things political rivals are saying. The list goes on and on.

Multiple experts have pointed out how the anti-CSAM efforts preferred by the EU would not only not work, but also subject millions of innocent people to the whims of malicious hackers and malicious governments. Governments also made these same points, finally forcing the EU Commission to back down on its attempt to undermine encryption, if not (practically) outlaw it entirely.

The Commission has always claimed its anti-encryption, pro-client-side scanning stance is backed by sound advice given to it by the experts it has consulted. But when asked who was consulted, the EU Commission has refused to answer the question. This is from the Irish Council of Civil Liberties (ICCL), which asked the Commission a simple question, but — like the Superintendent Chalmers referenced in the headline — was summarily rejected.

In response to a request for documents pertaining to the decision-making behind the proposed CSAM regulation, the European Commission failed to disclose a list of companies who were consulted about the technical feasibility of detecting CSAM without undermining encryption. This list “clearly fell within the scope” of the Irish Council for Civil Liberties’ request. 

If you’re not familiar with the reference, we’ll get you up to speed.

22 Short Films About Springfield is an episode of “The Simpsons” that originally aired in 1996. One particular “film” has become an internet meme legend: the one dealing with Principal Seymour Skinner’s attempt to impress his boss (Superintendent Chalmers) with a home-cooked meal.

One thing leads to another (and by one thing to another, I mean a fire in the kitchen as Skinner attempts to portray fast-food burgers as “steamed hams” and not the “steamed clams” promised earlier). That culminates in this spectacular cover-up by Principal Skinner when the superintendent asks about the extremely apparent fire occurring in the kitchen:

Principal Skinner: Oh well, that was wonderful. A good time was had by all. I’m pooped.

Chalmers: Yes. I should be– Good Lord! What is happening in there?

Principal Skinner: Aurora borealis.

Chalmers: Uh- Aurora borealis. At this time of year, at this time of day, in this part of the country, localized entirely within your kitchen?

Principal Skinner: Yes.

Chalmers [meekly]: May I see it?

Principal Skinner: No.

That is what happened here. Everyone opposing the EU Commission’s CSAM (i.e., “chat control”) efforts trotted out their experts, making it clearly apparent who was saying what and what their relevant expertise was. The EU insisted it had its own battery of experts. The ICCL said: “May we see them?”

The EU Commission: No.

Not good enough, said the ICCL. But that’s what a rights advocate would be expected to say. What’s less expected is the EU Commission’s ombudsman declaring the ICCL had the right to see this particularly specific aurora borealis.

After the Commission acknowledged to the EU Ombudsman that it, in fact, had such a list, but failed to disclose its existence to Dr Kris Shrishak, the Ombudsman held the Commission’s behaviour constituted “maladministration”.  

The Ombudsman held: “[t]he Commission did not identify the list of experts as falling within the scope of the complainant’s request. This means that the complainant did not have the opportunity to challenge (the reasons for) the institution’s refusal to disclose the document. This constitutes maladministration.” 

As the report further notes, the only existing documentation of this supposed consultation with experts has been reduced to a single self-serving document issued by the EU Commission. Any objections or interjections were added/subtracted as preferred by the EU Commission before presenting a “final” version that served its preferences. Any supporting documentation, including comments from participating stakeholders, were sent to the digital shredder.

As concerns the EUIF meetings, the Commission representatives explained that three online technical workshops took place in 2020. During the first workshop, academics, experts and companies were invited to share their perspectives on the matter as well as any documents that could be valuable for the discussion. After this workshop, a first draft of the ‘outcome document’ was produced, which summarises the input given orally by the participants and references a number of relevant documents. This first draft was shared with the participants via an online file sharing service and some participants provided written comments. Other participants commented orally on the first draft during the second workshop. Those contributions were then added to the final version of the ‘outcome document’ that was presented during the third and final workshop for the participants’ endorsement. This ‘outcome document’ is the only document that was produced in relation to the substance of these workshops. It was subsequently shared with the EUIF. One year later, it was used as supporting information to the impact assessment report.

In other words, the EU took what it liked and included it. The rest of it disappeared from the permanent record, supposedly because the EU Commission routinely purges any email communications more than two years old. This is obviously ridiculous in this context, considering this particular piece of legislation has been under discussion for far longer than that.

But, in the end, the EU Commission wins because it’s the larger bureaucracy. The ombudsman refused to issue a recommendation. Instead, it instructs the Commission to treat the ICCL’s request as “new” and perform another search for documents. “Swiftly.” Great, as far as that goes. But it doesn’t go far. The ombudsman also says it believes the EU Commission when it says only its version of the EUIF report survived the periodic document cull.

In the end, all that survives is this: the EU consulted with affected entities. It asked them to comment on the proposal. It folded those comments into its presentation. It likely presented only comments that supported its efforts. Dissenting opinions were auto-culled by EU Commission email protocols. It never sought further input, despite having passed the two-year mark without having converted the proposal into law. All that’s left, the ombudsman says, is likely a one-sided version of the Commission’s proposal. And if the ICCL doesn’t like it, well… it will have to find some other way to argue with the “experts” the Commission either ignored or auto-deleted. The government wins, even without winning arguments. Go figure.

Filed Under: , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Steamed Hams, Except It’s The EU Commission’s Alleged CSAM Regulation ‘Experts’”

Subscribe: RSS Leave a comment
37 Comments

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

Cat_Daddy (profile) says:

Re: Re: Re:4

Seymour: He begins to climb through the window, but Chalmers enters the kitchen. The theme song to an imaginary show called “Skinner and the Superintendent” then plays:

“Skinner with his crazy explanations,
The superintendent’s gonna need his medication,
When he hears Skinner’s lame exaggerations,
There’ll be trouble in town tonight!”

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

Anonymous Coward says:

There are many eu projects that go on far longer than 2 years ,so deleting all emails older than 2 years is no something that puts open government and democratic debate and the right to privacy as a basic right of all eu citizens .
Most countrys have rejected client side scanning as not compatible with the rights of citizens to privacy and something that threatens the right to
encryption of messages and emails .
but then its easy to find experts who are in favour of almost an technical measure and ignore the majority experts who put citizens right to privacy ahead of csam scanning.
this is more important as most people now use smartphones and emails to acess government services

Anonymous Coward says:

Re: Re:

Um… are you saying that “pointing out that if you are willing to cherry-pick your sources, you can find ‘experts’ for any position” is bullshit?

Or was it the “majority experts who put citizen privacy ahead of csam scanning”?

If you’re going to scream about someone being a shill, at least be clear about who they are shilling for, and about what particulars.

Anonymous Coward says:

Re:

It might just be that ISPs/intermediaries, and the sources of the comments might have copies of those emails.

The EU should still have an “invite list” somewhere, or institutional memory of the group of people asked to comment. Whether they’d be willing to confess to that (and risk those comments being found) is … not really likely.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

Cat_Daddy (profile) says:

Re:

Chalmers: “You call hamburgers ‘steamed hams’?”
Skinner: “Yes! It’s a regional dialect.”
Chalmers: “Uh-huh. Eh, what region?”
Skinner: “Uh…upstate New York.”
Chalmers: “Really? Well I’m from Utica and I’ve never heard anyone use the phrase ‘steamed hams’.”
Skinner: “Oh, not in Utica, no. It’s an Albany expression.”
Chalmers: “I see.”

This comment has been flagged by the community. Click here to show it.

Cat_Daddy (profile) says:

Re: Re:

Chalmers: takes a bite out of a burger and chews it a little. Skinner: Sips his drink.
Chalmers: “You know, these hamburgers are quite similar to the ones they have at Krusty Burger.”
Skinner: “Hohoho, no! Patented Skinner Burgers. Old family recipe!
Chalmers: “For steamed hams?”
Skinner: “Yes.”
Chalmers: “Yes, and you call them steamed hams, despite the fact they are obviously grilled.”

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

Cat_Daddy (profile) says:

Re: Re: Re:4

They exit the house as the kitchen fire grows larger.
Agnes: “Seymour! The house is on fire!”
Skinner: “No, mother, it’s just the Northern Lights.”
Chalmers: “Well, Seymour, you are an odd fellow, but I must say… you steam a good ham.”
Chalmers: begins heading home.
Agnes: screams for help causing Chalmers to look back towards the house. *
Skinner: *gives him a thumbs up and a fake smile, causing him to keep walking away. Once Chalmers is out of sight, Skinner rushes back into the house to deal with the fire.

This comment has been flagged by the community. Click here to show it.

That One Guy (profile) says:

Hiding everything but handpicked conclusions, always a good sign

You have to forgive them, they totally have solid evidence and experts to support their ‘down with encryption’ position they just left it in their other pants, at their girlfriend’s(she lives in canada and goes to another school, you wouldn’t know her) house.

They absolutely have it though and who is anyone here to call them a liar just because they aren’t presenting it and in fact are going above and beyond in not presenting anything that isn’t meticulously handpicked to support their argument.

Jamie says:

E2E is not broken by client-side scanning

It’s been noted a few times in these articles that client-side scanning is somehow breaking out weakening E2E encryption. That is not the case.

E2E encryption refers to the secure pipe between the sender and the recipient. The message is encrypted by the sender and only the recipient had the means to decrypt it. None of the servers the message transits along the way can access the message contents.

Client-side scanning happens either before the message enters the secure pipe or after it comes out the other end. The E2E encryption remains perfectly unbroken, but the privacy breach is still there.

The real issue with client-side scanning is that it’s fundamentally flawed.

If the content is sent to a server for scanning before it’s sent, that’s a massive privacy issue. There are also many ways to non-destructively alter images and text so that they no longer appear illicit.

If some or all of the processing is done on the device in order to preserve privacy, it’s possible to hack the process, feed it fake data, or bypass it completely. It’s about as effective as the “I’m not a terrorist” checkbox on immigration forms.

Law enforcement and law makers need to realise that people will always find ways to send illicit information to each other. It’s happened for thousands of years. It’s not a war they can win.

Anonymous Coward says:

Re:

Any access to contents of a encrypted channel by a third party against the wishes of the communication parties, by any means breaks encryption, or at least its usefulness.

Several issues arise if client side scanning is implemented, especially is it is a legal requirement provide and managed through the operating system and controlled to the supplier and not the user. If client side scanning is enabled for CSAM, how long before its use is extended into other areas? How is CSAM verified for new material if its not shopped of to a third party for examination and verification? How long before all messages are shipped off to a government database to preserve evidence of crimes? Expansion of use, and exporting of messages would be one update away, and outside the users control.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Subscribe to Our Newsletter

Get all our posts in your inbox with the Techdirt Daily Newsletter!

We don’t spam. Read our privacy policy for more info.

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...