{"id":2736,"date":"2024-09-03T13:54:59","date_gmt":"2024-09-03T11:54:59","guid":{"rendered":"https:\/\/tardigrada.noblogs.org\/?p=2736"},"modified":"2024-09-03T13:56:10","modified_gmt":"2024-09-03T11:56:10","slug":"libertes-publiques-police-justice-qui-peut-acceder-aux-messageries-privees","status":"publish","type":"post","link":"https:\/\/tardigrada.noblogs.org\/?p=2736","title":{"rendered":"LIBERT\u00c9S PUBLIQUES &#8211; Police, justice : qui peut acc\u00e9der aux messageries priv\u00e9es ?"},"content":{"rendered":"<h2 class=\"textLayer\" data-main-rotation=\"0\"><span id=\"p2R_mc0\" class=\"markedContent\"><\/span><span id=\"p2R_mc1\" class=\"markedContent\"><\/span><span dir=\"ltr\">LIBERT\u00c9S PUBLIQUES &#8211; <\/span><span dir=\"ltr\" role=\"presentation\">Police, justice<\/span> <span dir=\"ltr\" role=\"presentation\">: qui peut acc\u00e9der aux <\/span><span dir=\"ltr\" role=\"presentation\">messageries priv\u00e9es<\/span> <span dir=\"ltr\" role=\"presentation\">?<\/span><\/h2>\n<div data-main-rotation=\"0\"><span dir=\"ltr\" role=\"presentation\">J\u00e9r\u00f4me Hourdeaux<\/span> <span dir=\"ltr\" role=\"presentation\">&#8211; 2 septembre 2024 &#8211; M\u00e9diapart &#8211; article complet<br \/>\n<\/span><\/div>\n<div data-main-rotation=\"0\"><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><span dir=\"ltr\" role=\"presentation\">Mediapart fait le point sur le droit applicable en <\/span><span dir=\"ltr\" role=\"presentation\">mati\u00e8re d\u2019acc\u00e8s judiciaire aux donn\u00e9es de connexion <\/span><span dir=\"ltr\" role=\"presentation\">ou aux communications \u00e9chang\u00e9es via des services <\/span><span dir=\"ltr\" role=\"presentation\">tels que Telegram.<\/span><span id=\"p2R_mc2\" class=\"markedContent\"><\/span><span id=\"p2R_mc3\" class=\"markedContent\"><\/span><br role=\"presentation\" \/><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">S<\/span> <span dir=\"ltr\" role=\"presentation\">i Pavel Durov, le patron de Telegram, est vis\u00e9 par <\/span><span dir=\"ltr\" role=\"presentation\">une douzaine de charges, un \u00e9l\u00e9ment semble avoir <\/span><span dir=\"ltr\" role=\"presentation\">\u00e9t\u00e9 d\u00e9terminant dans la d\u00e9cision de la justice fran\u00e7aise <\/span><span dir=\"ltr\" role=\"presentation\">de l\u2019interpeller et de le mettre en examen<\/span> <span dir=\"ltr\" role=\"presentation\">:<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">La quasi<\/span><\/em><br role=\"presentation\" \/><em><span dir=\"ltr\" role=\"presentation\">totale absence de r\u00e9ponse de Telegram aux r\u00e9quisitions <\/span><span dir=\"ltr\" role=\"presentation\">judiciaires<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><span dir=\"ltr\" role=\"presentation\">, soulign\u00e9e en gras dans<\/span><span id=\"p2R_mc4\" class=\"markedContent\"><\/span><span id=\"p2R_mc5\" class=\"markedContent\"><\/span> <span dir=\"ltr\">le communiqu\u00e9 du<\/span> <span dir=\"ltr\" role=\"presentation\">parquet de Paris<\/span> <span dir=\"ltr\" role=\"presentation\">diffus\u00e9 mercredi 28 ao\u00fbt.<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Comme l\u2019a r\u00e9v\u00e9l\u00e9<\/span><span id=\"p2R_mc8\" class=\"markedContent\"><\/span><span id=\"p2R_mc9\" class=\"markedContent\"><\/span> <span dir=\"ltr\" role=\"presentation\">le site Politico, le refus de la soci\u00e9t\u00e9 <\/span><span dir=\"ltr\" role=\"presentation\">d\u2019identifier un p\u00e9docriminel ayant fait des aveux \u00e0 des <\/span><span dir=\"ltr\" role=\"presentation\">enqu\u00eateurs sous couverture semble avoir \u00e9t\u00e9 <\/span><span dir=\"ltr\" role=\"presentation\">d\u00e9terminant. Mais le probl\u00e8me est plus global. Comme le<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">rapporte<\/span><span id=\"p2R_mc10\" class=\"markedContent\"><\/span><span id=\"p2R_mc11\" class=\"markedContent\"><\/span><span id=\"p2R_mc12\" class=\"markedContent\"><\/span> <span dir=\"ltr\" role=\"presentation\">Lib\u00e9ration<\/span><span dir=\"ltr\" role=\"presentation\">,<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">la gendarmerie nationale a signal\u00e9 <\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 elle seule 2<\/span> <span dir=\"ltr\" role=\"presentation\">460 proc\u00e9dures, entre 2013 et 2024, dans <\/span><span dir=\"ltr\" role=\"presentation\">lesquelles des r\u00e9quisitions envoy\u00e9es \u00e0 Telegram sont rest\u00e9es <\/span><span dir=\"ltr\" role=\"presentation\">sans suite<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><span dir=\"ltr\" role=\"presentation\">.<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Plusieurs voix, comme celle du lanceur d\u2019alerte<\/span><span id=\"p2R_mc13\" class=\"markedContent\"><\/span><span id=\"p2R_mc14\" class=\"markedContent\"><\/span> <span dir=\"ltr\">Edward<\/span> <span dir=\"ltr\" role=\"presentation\">Snowden<\/span><span dir=\"ltr\" role=\"presentation\">, se sont \u00e9lev\u00e9es pour s\u2019inqui\u00e9ter de cette <\/span><span dir=\"ltr\" role=\"presentation\">proc\u00e9dure in\u00e9dite qui menacerait le droit \u00e0 \u00e9changer de <\/span><span dir=\"ltr\" role=\"presentation\">mani\u00e8re s\u00e9curis\u00e9e. L\u2019arrestation de Pavel Durov<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">intervient en effet dans le contexte d\u2019une pression <\/span><span dir=\"ltr\" role=\"presentation\">croissante exerc\u00e9e sur les op\u00e9rateurs pour les contraindre <\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 mieux contr\u00f4ler les contenus de leurs utilisateurs, <\/span><span dir=\"ltr\" role=\"presentation\">quitte \u00e0 s\u2019attaquer aux outils de chiffrement.<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Les enqu\u00eateurs ne sont pourtant pas sans moyens. <\/span><span dir=\"ltr\" role=\"presentation\">Plusieurs outils sont en effet \u00e0 leur disposition en <\/span><span dir=\"ltr\" role=\"presentation\">mati\u00e8re judiciaire, encadr\u00e9s par des proc\u00e9dures visant \u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">garantir la vie priv\u00e9e des citoyens. Mediapart a interrog\u00e9<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">deux juristes pour faire le point sur le cadre juridique en <\/span><span dir=\"ltr\" role=\"presentation\">vigueur.<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><strong><span dir=\"ltr\" role=\"presentation\">L\u2019acc\u00e8s aux donn\u00e9es de connexion<\/span><\/strong><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Le premier niveau d\u2019intrusion est l\u2019acc\u00e8s aux donn\u00e9es de <\/span><span dir=\"ltr\" role=\"presentation\">connexion. \u00c0 l\u2019instar des fameuses \u00ab<\/span> <span dir=\"ltr\" role=\"presentation\">fadettes<\/span> <span dir=\"ltr\" role=\"presentation\">\u00bb en <\/span><span dir=\"ltr\" role=\"presentation\">mati\u00e8re t\u00e9l\u00e9phonique, elles sont constitu\u00e9es de <\/span><span dir=\"ltr\" role=\"presentation\">l\u2019ensemble des donn\u00e9es techniques produites par un<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">\u00e9change de messages. Elles peuvent comprendre les <\/span><span dir=\"ltr\" role=\"presentation\">adresses IP, permettant de localiser les lieux de <\/span><span dir=\"ltr\" role=\"presentation\">connexion, \u00e9ventuellement la g\u00e9olocalisation, les <\/span><span dir=\"ltr\">num\u00e9ros de t\u00e9l\u00e9phone, la dur\u00e9e des appels ou longueur <\/span><span dir=\"ltr\" role=\"presentation\">des messages, \u00e9ventuellement leur objet\u2026<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">Cela ne donne pas acc\u00e8s au contenu des messages<\/span><span dir=\"ltr\" role=\"presentation\">, <\/span><span dir=\"ltr\" role=\"presentation\">pr\u00e9cise J\u00e9r\u00f4me Bossan, ma\u00eetre de conf\u00e9rences \u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">l\u2019universit\u00e9 de Poitiers, sp\u00e9cialis\u00e9 en cybercriminalit\u00e9, <\/span><span dir=\"ltr\" role=\"presentation\">mais le croisement de l\u2019ensemble des donn\u00e9es de connexion<\/span><\/em><br role=\"presentation\" \/><em><span dir=\"ltr\" role=\"presentation\">peut entra\u00eener une atteinte parfois tr\u00e8s importante \u00e0 la vie <\/span><span dir=\"ltr\" role=\"presentation\">priv\u00e9e.<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">La l\u00e9gislation fran\u00e7aise impose \u00e0 l\u2019ensemble des <\/span><span dir=\"ltr\" role=\"presentation\">op\u00e9rateurs de services de conserver les donn\u00e9es de <\/span><span dir=\"ltr\" role=\"presentation\">connexion.<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">Il peut y avoir des r\u00e9quisitions d\u00e8s l\u2019enqu\u00eate <\/span><span dir=\"ltr\" role=\"presentation\">et de mani\u00e8re assez simple<\/span><\/em><span dir=\"ltr\" role=\"presentation\">, poursuit J\u00e9r\u00f4me Bossan.<\/span> <em><span dir=\"ltr\" role=\"presentation\">Elles<\/span><\/em><br role=\"presentation\" \/><em><span dir=\"ltr\" role=\"presentation\">peuvent par exemple \u00eatre demand\u00e9es par un officier de <\/span><span dir=\"ltr\" role=\"presentation\">police en cas de flagrance. Dans le cadre d\u2019une enqu\u00eate <\/span><span dir=\"ltr\" role=\"presentation\">pr\u00e9liminaire, il faudra l\u2019autorisation du procureur, et dans <\/span><span dir=\"ltr\" role=\"presentation\">le cadre d\u2019une instruction, celle du juge d\u2019instruction.<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><strong><span dir=\"ltr\" role=\"presentation\">Comment la France contourne le droit europ\u00e9en<\/span><\/strong><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">En rendant, le 8 avril 2014, son arr\u00eat \u00ab<\/span> <span dir=\"ltr\" role=\"presentation\">Digital Rights<\/span> <span dir=\"ltr\" role=\"presentation\">\u00bb, la Cour de <\/span><span dir=\"ltr\" role=\"presentation\">justice de l\u2019Union europ\u00e9enne (CJUE) a cr\u00e9\u00e9 un s\u00e9isme juridique qui, <\/span><span dir=\"ltr\" role=\"presentation\">dix ans plus tard, secoue encore le droit fran\u00e7ais. Dans cette <\/span><span dir=\"ltr\" role=\"presentation\">d\u00e9cision historique, la cour a en e<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">et estim\u00e9 que les obligations de <\/span><span dir=\"ltr\" role=\"presentation\">conservation g\u00e9n\u00e9rale et indi<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">\u00e9renci\u00e9e de donn\u00e9es de connexion <\/span><span dir=\"ltr\" role=\"presentation\">constituent <\/span><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">une ing\u00e9rence<\/span><\/em> <span dir=\"ltr\" role=\"presentation\">\u00bb dans les droits fondamentaux <\/span><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">d\u2019une <\/span><span dir=\"ltr\" role=\"presentation\">vaste ampleur et d\u2019une gravit\u00e9 particuli\u00e8re dans l\u2019ordre juridique de <\/span><span dir=\"ltr\" role=\"presentation\">l\u2019Union<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb.<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">L\u2019arr\u00eat \u00ab<\/span> <span dir=\"ltr\" role=\"presentation\">Digital Rights<\/span> <span dir=\"ltr\" role=\"presentation\">\u00bb a ouvert la voie \u00e0 une s\u00e9rie de d\u00e9cisions <\/span><span dir=\"ltr\" role=\"presentation\">visant les l\u00e9gislations nationales imposant aux op\u00e9rateurs une <\/span><span dir=\"ltr\" role=\"presentation\">conservation des donn\u00e9es de connexion, dont la France, o\u00f9 un grand <\/span><span dir=\"ltr\" role=\"presentation\">nombre d\u2019enqu\u00eates reposent sur l\u2019acc\u00e8s aux donn\u00e9es de connexion, <\/span><span dir=\"ltr\" role=\"presentation\">notamment en mati\u00e8re de stup\u00e9<\/span><span dir=\"ltr\" role=\"presentation\">\ufb01<\/span><span dir=\"ltr\" role=\"presentation\">ants. <\/span><span dir=\"ltr\" role=\"presentation\">Le Conseil d\u2019\u00c9tat s\u2019est prononc\u00e9 sur l\u2019application de la jurisprudence <\/span><span dir=\"ltr\" role=\"presentation\">de la CJUE en droit fran\u00e7ais dans un arr\u00eat rendu le 21 avril 2021, qui <\/span><span dir=\"ltr\" role=\"presentation\">n\u2019a fait que contourner le probl\u00e8me. En e<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">et, le juge administratif <\/span><span dir=\"ltr\" role=\"presentation\">supr\u00eame fran\u00e7ais y reconna\u00eet bien la primaut\u00e9 du droit europ\u00e9en et a <\/span><span dir=\"ltr\" role=\"presentation\">ordonn\u00e9 au gouvernement d\u2019abroger l\u2019obligation de conservation des<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">donn\u00e9es de connexion.<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Mais, dans le m\u00eame temps, le Conseil d\u2019\u00c9tat a estim\u00e9 qu\u2019il existe des <\/span><span dir=\"ltr\" role=\"presentation\">circonstances exceptionnelles li\u00e9es <\/span><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">\u00e0 la s\u00e9curit\u00e9 nationale et \u00e0 la <\/span><span dir=\"ltr\" role=\"presentation\">lutte contre la criminalit\u00e9<\/span><\/em> <span dir=\"ltr\" role=\"presentation\">\u00bb permettant d\u2019\u00e9carter, temporairement, le <\/span><span dir=\"ltr\" role=\"presentation\">droit europ\u00e9en. Depuis, il su<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">it au gouvernement de prendre, chaque <\/span><span dir=\"ltr\" role=\"presentation\">ann\u00e9e, un tr\u00e8s bref d\u00e9cret <\/span><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">portant injonction au regard de la <\/span><span dir=\"ltr\" role=\"presentation\">menace grave et actuelle contre la s\u00e9curit\u00e9 nationale de <\/span><span dir=\"ltr\" role=\"presentation\">conservation pour une dur\u00e9e d\u2019un an de certaines cat\u00e9gories de <\/span><span dir=\"ltr\" role=\"presentation\">donn\u00e9es de connexion<\/span><\/em> <span dir=\"ltr\" role=\"presentation\">\u00bb, dont le dernier a \u00e9t\u00e9<\/span><span id=\"p71R_mc0\" class=\"markedContent\"><\/span><span id=\"p71R_mc1\" class=\"markedContent\"><\/span> <span dir=\"ltr\" role=\"presentation\">publi\u00e9 au <\/span><span dir=\"ltr\" role=\"presentation\">Journal <\/span><span dir=\"ltr\" role=\"presentation\">o<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">iciel<\/span> <span dir=\"ltr\" role=\"presentation\">le 10 octobre 2023.<\/span><\/div>\n<div data-main-rotation=\"0\"><\/div>\n<div data-main-rotation=\"0\">\n<hr \/>\n<\/div>\n<div data-main-rotation=\"0\"><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><span dir=\"ltr\" role=\"presentation\">Depuis 2021, et en r\u00e9ponse \u00e0 un arr\u00eat de la Cour de justice <\/span><span dir=\"ltr\" role=\"presentation\">de l\u2019Union europ\u00e9enne<\/span><span dir=\"ltr\" role=\"presentation\">, plusieurs <\/span><span dir=\"ltr\" role=\"presentation\">textes et d\u00e9cisions de justice ont pr\u00e9cis\u00e9 les conditions <\/span><span dir=\"ltr\" role=\"presentation\">d\u2019acc\u00e8s aux donn\u00e9es de connexion, comme la loi sur la <\/span><span dir=\"ltr\" role=\"presentation\">pr\u00e9vention du terrorisme et le renseignement du 30 <\/span><span dir=\"ltr\" role=\"presentation\">juillet 2021, qui a fix\u00e9 des dur\u00e9es de conservation <\/span><span dir=\"ltr\" role=\"presentation\">diff\u00e9renci\u00e9es pouvant aller de une \u00e0 cinq ann\u00e9es en <\/span><span dir=\"ltr\" role=\"presentation\">fonction de la nature de la donn\u00e9e et de la finalit\u00e9<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">poursuivie. Une loi du 2 mars 2022 a \u00e9galement pr\u00e9cis\u00e9 la <\/span><span dir=\"ltr\" role=\"presentation\">proc\u00e9dure de r\u00e9quisition des donn\u00e9es de connexion dans <\/span><span dir=\"ltr\" role=\"presentation\">le cadre d\u2019une enqu\u00eate p\u00e9nale.<\/span><\/div>\n<div data-main-rotation=\"0\"><\/div>\n<div data-main-rotation=\"0\">Du c\u00f4t\u00e9 de la Cour de cassation, quatre d\u00e9cisions rendues le 12 juillet 2022 ont pr\u00e9cis\u00e9 les conditions dans lesquelles les procureurs pouvaient acc\u00e9der aux donn\u00e9es de connexion. Et au mois de f\u00e9vrier 2024, un nouvel arr\u00eat a impos\u00e9 l\u2019intervention d\u2019une autorit\u00e9 administrative ind\u00e9pendante, et non plus seulement du parquet, pour autoriser la localisation en temps r\u00e9el des t\u00e9l\u00e9phones.<\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><strong><span dir=\"ltr\" role=\"presentation\">L\u2019interception des communications<\/span><\/strong><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Les enqu\u00eateurs ont ensuite la possibilit\u00e9 de demander <\/span><span dir=\"ltr\" role=\"presentation\">aux op\u00e9rateurs l\u2019acc\u00e8s aux contenus des messages.<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">Les <\/span><span dir=\"ltr\" role=\"presentation\">interceptions de correspondances sont autoris\u00e9es dans le <\/span><span dir=\"ltr\" role=\"presentation\">cadre de l\u2019instruction pr\u00e9paratoire ou durant l\u2019enqu\u00eate <\/span><span dir=\"ltr\" role=\"presentation\">judiciaire mais uniquement pour la d\u00e9linquance et la <\/span><span dir=\"ltr\" role=\"presentation\">criminalit\u00e9 organis\u00e9es<\/span><\/em><span dir=\"ltr\" role=\"presentation\">, pr\u00e9cise J\u00e9r\u00f4me Bossan.<\/span> <em><span dir=\"ltr\" role=\"presentation\">Et la <\/span><span dir=\"ltr\" role=\"presentation\">jurisprudence reconna\u00eet depuis 2015 que l\u2019interception des <\/span><span dir=\"ltr\" role=\"presentation\">correspondances peut viser les messageries instantan\u00e9es.<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span><em><span dir=\"ltr\" role=\"presentation\">Une deuxi\u00e8me technique se d\u00e9veloppe<\/span><span dir=\"ltr\" role=\"presentation\">, ajoute le juriste, <\/span><span dir=\"ltr\" role=\"presentation\">l\u2019acc\u00e8s \u00e0 distance aux donn\u00e9es de correspondances stock\u00e9es <\/span><span dir=\"ltr\" role=\"presentation\">dans un appareil. Dans ce cas, on n\u2019acc\u00e8de plus aux <\/span><span dir=\"ltr\" role=\"presentation\">\u00e9changes \u00e0 venir, mais \u00e9galement \u00e0 ceux pass\u00e9s, stock\u00e9s <\/span><span dir=\"ltr\" role=\"presentation\">dans l\u2019ordinateur ou le t\u00e9l\u00e9phone. L\u2019atteinte \u00e0 la vie priv\u00e9e <\/span><span dir=\"ltr\" role=\"presentation\">est donc encore plus grande. C\u2019est une technique qui est <\/span><span dir=\"ltr\" role=\"presentation\">r\u00e9serv\u00e9e aux crimes et elle doit \u00eatre autoris\u00e9e par le juge <\/span><\/em><span dir=\"ltr\" role=\"presentation\"><em>des libert\u00e9s et de la d\u00e9tention<\/em>.<\/span><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><strong><span dir=\"ltr\" role=\"presentation\">Le probl\u00e8me de la nationalit\u00e9 de l\u2019op\u00e9rateur<\/span><\/strong><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">L\u2019\u00c9tat fran\u00e7ais n\u2019a pas le pouvoir de contraindre un <\/span><span dir=\"ltr\" role=\"presentation\">op\u00e9rateur \u00e9tranger \u00e0 donner des informations<\/span><span dir=\"ltr\" role=\"presentation\">, explique <\/span><span dir=\"ltr\" role=\"presentation\">encore J\u00e9r\u00f4me Bossan.<\/span> <span dir=\"ltr\" role=\"presentation\">Dans ce cas, il faudra donc passer <\/span><span dir=\"ltr\" role=\"presentation\">par des demandes de coop\u00e9ration internationale.<\/span><\/em> <span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Or cette coop\u00e9ration n\u2019est pas toujours \u00e9vidente.<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">Les <\/span><span dir=\"ltr\" role=\"presentation\">enqu\u00eateurs se plaignent souvent car l\u2019une des choses <\/span><span dir=\"ltr\" role=\"presentation\">auxquelles les op\u00e9rateurs tiennent, c\u2019est aux int\u00e9r\u00eats de <\/span><span dir=\"ltr\" role=\"presentation\">leurs usagers<\/span><\/em><span dir=\"ltr\" role=\"presentation\"><em>,<\/em> poursuit-il.<\/span> <em><span dir=\"ltr\" role=\"presentation\">Je n\u2019ai pas connaissance de <\/span><\/em><em><span dir=\"ltr\" role=\"presentation\">chiffres exacts sur le sujet. Mais j\u2019ai entendu que la <\/span><span dir=\"ltr\" role=\"presentation\">coop\u00e9ration est difficile, principalement en mati\u00e8re de <\/span><span dir=\"ltr\" role=\"presentation\">diffamation ou d\u2019injure. Pour des infractions relevant du <\/span><span dir=\"ltr\" role=\"presentation\">terrorisme ou de la p\u00e9docriminalit\u00e9, ces soci\u00e9t\u00e9s se sont <\/span><span dir=\"ltr\" role=\"presentation\">beaucoup fait taper sur les doigts au fil des ann\u00e9es. <\/span><\/em><em><span dir=\"ltr\" role=\"presentation\">D\u00e9sormais, elles collaborent plus, m\u00eame elles semblent <\/span><span dir=\"ltr\" role=\"presentation\">investir plus dans la mod\u00e9ration interne.<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><strong><span dir=\"ltr\" role=\"presentation\">Les enqu\u00eateurs face au chiffrement<\/span><\/strong><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\">Cela fait de nombreuses ann\u00e9es que certains <\/span><span dir=\"ltr\" role=\"presentation\">responsables politiques, policiers ou magistrats <\/span><span dir=\"ltr\" role=\"presentation\">s\u2019alarment du chiffrement croissant des appareils <\/span><span dir=\"ltr\" role=\"presentation\">num\u00e9riques et des communications. D\u00e8s 2015, trois <\/span><span dir=\"ltr\" role=\"presentation\">magistrats (un Am\u00e9ricain, un Espagnol et le Fran\u00e7ais <\/span><span dir=\"ltr\" role=\"presentation\">Fran\u00e7ois Molins, alors procureur de Paris) et le pr\u00e9fet de <\/span><span dir=\"ltr\" role=\"presentation\">police de Londres (Royaume-Uni) avaient publi\u00e9<\/span><span id=\"p71R_mc8\" class=\"markedContent\"><\/span><span id=\"p71R_mc9\" class=\"markedContent\"><\/span> <span dir=\"ltr\">dans le <\/span><span dir=\"ltr\" role=\"presentation\">New York Times<\/span> <span dir=\"ltr\" role=\"presentation\">une tribune au retentissement mondial<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">affirmant<\/span> <span dir=\"ltr\" role=\"presentation\">:<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span><em> <span dir=\"ltr\" role=\"presentation\">Au nom des victimes de crimes dans le <\/span><span dir=\"ltr\" role=\"presentation\">monde entier, nous nous demandons si le chiffrement vaut <\/span><span dir=\"ltr\" role=\"presentation\">vraiment ce co\u00fbt.<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Dans le cas des messageries s\u00e9curis\u00e9es, le chiffrement dit <\/span><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <span dir=\"ltr\" role=\"presentation\">de bout en bout<\/span> <span dir=\"ltr\" role=\"presentation\">\u00bb assure les utilisateurs qu\u2019eux seuls <\/span><span dir=\"ltr\" role=\"presentation\">pourront d\u00e9chiffrer le message.<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">Or, le prestataire n\u2019a <\/span><span dir=\"ltr\" role=\"presentation\">que l\u2019obligation de donner les informations en sa<\/span><\/em><br role=\"presentation\" \/><em><span dir=\"ltr\" role=\"presentation\">possession. Il ne peut pas livrer celles qu\u2019il n\u2019a pas<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><span dir=\"ltr\" role=\"presentation\">, <\/span><span dir=\"ltr\" role=\"presentation\">souligne Estelle De Marco, juriste sp\u00e9cialis\u00e9e en droit <\/span><span dir=\"ltr\" role=\"presentation\">p\u00e9nal et droit du num\u00e9rique.<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">R\u00e9guli\u00e8rement, des voix s\u2019\u00e9l\u00e8vent pour demander un <\/span><span dir=\"ltr\" role=\"presentation\">affaiblissement des technologies de chiffrement \u00e0 la <\/span><span dir=\"ltr\" role=\"presentation\">disposition des utilisateurs et utilisatrices, par exemple <\/span><span dir=\"ltr\" role=\"presentation\">en imposant aux fournisseurs d\u2019installer des<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">back<\/span><\/em><br role=\"presentation\" \/><em><span dir=\"ltr\" role=\"presentation\">doors<\/span><\/em> <span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><span dir=\"ltr\" role=\"presentation\">, des \u00ab<\/span> <span dir=\"ltr\" role=\"presentation\">portes d\u00e9rob\u00e9es<\/span> <span dir=\"ltr\" role=\"presentation\">\u00bb, dans leurs logiciels ou <\/span><span dir=\"ltr\" role=\"presentation\">de fournir les clefs de chiffrement \u00e0 la police. Des <\/span><span dir=\"ltr\" role=\"presentation\">solutions qui auraient pour cons\u00e9quence de fragiliser la <\/span><span dir=\"ltr\" role=\"presentation\">s\u00e9curit\u00e9 de l\u2019ensemble des utilisateurs.<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">La Cour europ\u00e9enne des droits de l\u2019homme a r\u00e9affirm\u00e9 <\/span><span dir=\"ltr\" role=\"presentation\">encore r\u00e9cemment qu\u2019il ne fallait pas toucher au <\/span><span dir=\"ltr\" role=\"presentation\">chiffrement, car il s\u2019agirait d\u2019une atteinte disproportionn\u00e9e <\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 la vie priv\u00e9e<\/span><\/em><span dir=\"ltr\" role=\"presentation\">, rappelle Estelle De Marco.<\/span> <em><span dir=\"ltr\" role=\"presentation\">En France, <\/span><span dir=\"ltr\" role=\"presentation\">l\u2019Anssi<\/span><\/em><span dir=\"ltr\" role=\"presentation\">[Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes <\/span><span dir=\"ltr\" role=\"presentation\">d\u2019information \u2013 ndlr]<\/span><em><span dir=\"ltr\" role=\"presentation\">partage cet avis et estime <\/span><span dir=\"ltr\" role=\"presentation\">qu\u2019affaiblir le chiffrement impacterait l\u2019ensemble des <\/span><span dir=\"ltr\" role=\"presentation\">communications, celles des criminels comme celles des <\/span><span dir=\"ltr\" role=\"presentation\">autres citoyens.<\/span><\/em><span dir=\"ltr\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">Il existe un projet de r\u00e8glement europ\u00e9en appel\u00e9<\/span><span id=\"p104R_mc0\" class=\"markedContent\"><\/span><span id=\"p104R_mc1\" class=\"markedContent\"><\/span> <span dir=\"ltr\">\u201cChat <\/span><span dir=\"ltr\" role=\"presentation\">control\u201d<\/span> <span dir=\"ltr\" role=\"presentation\">actuellement bloqu\u00e9 mais qui inqui\u00e8te beaucoup<\/span><span dir=\"ltr\" role=\"presentation\">, <\/span><span dir=\"ltr\" role=\"presentation\">reprend J\u00e9r\u00f4me Bossan.<\/span> <span dir=\"ltr\" role=\"presentation\">Il vise en effet \u00e0 imposer aux <\/span><span dir=\"ltr\" role=\"presentation\">op\u00e9rateurs d\u2019analyser les messages\u00a0 automatiquement pour <\/span><span dir=\"ltr\" role=\"presentation\">d\u00e9tecter les contenus p\u00e9dophiles, ce qui impliquerait de <\/span><span dir=\"ltr\" role=\"presentation\">casser le chiffrement. C\u2019est une bonne illustration de la <\/span><span dir=\"ltr\" role=\"presentation\">tension existant entre la n\u00e9cessit\u00e9 de lutter contre <\/span><span dir=\"ltr\" role=\"presentation\">certaines criminalit\u00e9s et celle de prot\u00e9ger la vie priv\u00e9e.<\/span><\/em> <span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><strong><span dir=\"ltr\" role=\"presentation\">L\u2019obligation de donner ses cl\u00e9s de chi<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">rement et le code <\/span><\/strong><span dir=\"ltr\" role=\"presentation\"><strong>de son smartphone<\/strong> <\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Si les enqu\u00eateurs sont parvenus \u00e0 mettre la main sur le propri\u00e9taire <\/span><span dir=\"ltr\" role=\"presentation\">des donn\u00e9es chi<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">r\u00e9es, ils peuvent exiger de lui son code de <\/span><span dir=\"ltr\" role=\"presentation\">d\u00e9chi<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">rement.<\/span><span id=\"p104R_mc4\" class=\"markedContent\"><\/span><span id=\"p104R_mc5\" class=\"markedContent\"><\/span> <span dir=\"ltr\" role=\"presentation\">L\u2019article 434-15-2 du Code p\u00e9nal punit en e<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">et de <\/span><span dir=\"ltr\" role=\"presentation\">trois ans\u00a0 d\u2019emprisonnement et de 270<\/span> <span dir=\"ltr\" role=\"presentation\">000 euros d\u2019amende le fait de <\/span><span dir=\"ltr\" role=\"presentation\">refuser de donner la cl\u00e9 de d\u00e9chi<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">rement d\u2019un logiciel susceptible <\/span><span dir=\"ltr\" role=\"presentation\">d\u2019avoir \u00e9t\u00e9 utilis\u00e9 pour commettre une infraction.<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Longtemps, la justice fran\u00e7aise a h\u00e9sit\u00e9 sur le point de savoir si <\/span><span dir=\"ltr\" role=\"presentation\">cette obligation incluait le code de d\u00e9verrouillage de smartphones.<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><span id=\"p104R_mc6\" class=\"markedContent\"><\/span><span id=\"p104R_mc7\" class=\"markedContent\"><\/span><br role=\"presentation\" \/><span dir=\"ltr\">Dans un arr\u00eat rendu le 7<\/span><span id=\"p104R_mc8\" class=\"markedContent\"><\/span><span id=\"p104R_mc9\" class=\"markedContent\"><\/span><span id=\"p104R_mc10\" class=\"markedContent\"><\/span> <span dir=\"ltr\" role=\"presentation\">novembre 2023, la Cour de cassation a <\/span><span dir=\"ltr\" role=\"presentation\">\ufb01<\/span><span dir=\"ltr\" role=\"presentation\">nalement mis<\/span> <span dir=\"ltr\" role=\"presentation\">\ufb01<\/span><span dir=\"ltr\" role=\"presentation\">n \u00e0 plusieurs ann\u00e9es de divergences entre <\/span><span dir=\"ltr\" role=\"presentation\">juridictions en a<\/span><span dir=\"ltr\" role=\"presentation\">\ufb00<\/span><span dir=\"ltr\" role=\"presentation\">irmant qu\u2019une personne interpell\u00e9e avait bien <\/span><span dir=\"ltr\" role=\"presentation\">l\u2019obligation de fournir aux policiers le code de son t\u00e9l\u00e9phone.<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Pour Estelle De Marco, le d\u00e9bat juridique n\u2019est cependant pas <\/span><span dir=\"ltr\" role=\"presentation\">totalement clos. <\/span><span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">Il ne faut pas s\u2019arr\u00eater \u00e0 la loi fran\u00e7aise, rappelle-<\/span><span dir=\"ltr\" role=\"presentation\">t-elle. <\/span><span dir=\"ltr\" role=\"presentation\">Il reste encore les juridictions europ\u00e9ennes et certains <\/span><span dir=\"ltr\" role=\"presentation\">consid\u00e8rent que cette mesure reste probl\u00e9matique. Tout d\u2019abord, on <\/span><span dir=\"ltr\" role=\"presentation\">acc\u00e8de \u00e0 l\u2019ensemble des donn\u00e9es personnelles de l\u2019appareil alors <\/span><span dir=\"ltr\" role=\"presentation\">qu\u2019une partie seulement int\u00e9resse les enqu\u00eateurs. Ensuite, le fait de <\/span><span dir=\"ltr\" role=\"presentation\">permettre le d\u00e9verrouillage de son propre t\u00e9l\u00e9phone peut relever <\/span><span dir=\"ltr\" role=\"presentation\">d\u2019une obligation d\u2019auto-incrimination, ce qui est normalement <\/span><span dir=\"ltr\" role=\"presentation\">interdit.<\/span><\/em> <span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div data-main-rotation=\"0\"><\/div>\n<div data-main-rotation=\"0\">\n<hr \/>\n<\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Les enqu\u00eateurs ne sont pourtant pas totalement d\u00e9munis <\/span><span dir=\"ltr\" role=\"presentation\">face au chiffrement. Lorsqu\u2019ils mettent la main sur un <\/span><span dir=\"ltr\" role=\"presentation\">contenu chiffr\u00e9, ils disposent d\u2019experts qui pourront <\/span><span dir=\"ltr\" role=\"presentation\">tenter de forcer l\u2019acc\u00e8s \u00e0 celui-ci, regroup\u00e9s au sein de<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">l\u2019Office anti-cybercriminalit\u00e9 (Ofac) pour les policiers et <\/span><span dir=\"ltr\" role=\"presentation\">le Commandement de la gendarmerie dans le <\/span><span dir=\"ltr\" role=\"presentation\">cyberespace (ComCyberGend) pour les gendarmes.<\/span><\/div>\n<div data-main-rotation=\"0\"><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><span dir=\"ltr\" role=\"presentation\"><strong>Les techniques sp\u00e9ciales d\u2019enqu\u00eate<\/strong> <\/span><\/div>\n<div data-main-rotation=\"0\"><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><span dir=\"ltr\" role=\"presentation\">Le terme<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">techniques sp\u00e9ciales d\u2019enqu\u00eate<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span> <span dir=\"ltr\" role=\"presentation\">a \u00e9t\u00e9 <\/span><span dir=\"ltr\" role=\"presentation\">introduit dans le Code p\u00e9nal par la loi de programmation <\/span><span dir=\"ltr\" role=\"presentation\">et de r\u00e9forme pour la justice du 23 mars 2019, qui <\/span><span dir=\"ltr\" role=\"presentation\">autorise les enqu\u00eateurs \u00e0 y avoir recours en mati\u00e8re de <\/span><span dir=\"ltr\" role=\"presentation\">d\u00e9linquance et de criminalit\u00e9 organis\u00e9es. <\/span><\/div>\n<div data-main-rotation=\"0\"><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><span dir=\"ltr\" role=\"presentation\">Il s\u2019agit des techniques les plus intrusives, comparables \u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">celles \u00e0 la disposition des services de renseignement.<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span><em> <span dir=\"ltr\" role=\"presentation\">Il <\/span><span dir=\"ltr\" role=\"presentation\">y a l\u2019acc\u00e8s \u00e0 distance aux donn\u00e9es stock\u00e9es, la sonorisation, <\/span><span dir=\"ltr\" role=\"presentation\">la captation d\u2019images, de donn\u00e9es informatiques, <\/span><span dir=\"ltr\" role=\"presentation\">l\u2019installation de \u201c<\/span><span dir=\"ltr\" role=\"presentation\">keyloggers<\/span><span dir=\"ltr\" role=\"presentation\">\u201d qui permettent de voir tout <\/span><span dir=\"ltr\" role=\"presentation\">ce que vous faites sur votre appareil\u2026 et d\u2019une mani\u00e8re <\/span><span dir=\"ltr\" role=\"presentation\">g\u00e9n\u00e9rale, n\u2019importe quel programme, logiciel ou moyen <\/span><span dir=\"ltr\" role=\"presentation\">prot\u00e9g\u00e9 par la d\u00e9fense nationale<\/span><\/em><span dir=\"ltr\" role=\"presentation\">, d\u00e9taille J\u00e9r\u00f4me Bossan. <\/span><em><span dir=\"ltr\" role=\"presentation\">Ce sont des techniques qui rel\u00e8vent d\u2019une certaine forme de <\/span><span dir=\"ltr\" role=\"presentation\">piratage informatique, mais autoris\u00e9 par la loi dans un <\/span><span dir=\"ltr\" role=\"presentation\">contexte particulier et un r\u00e9gime particulier.<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Enfin, les services de renseignement disposent de <\/span><span dir=\"ltr\" role=\"presentation\">pouvoirs encore plus larges. La loi sur le renseignement <\/span><span dir=\"ltr\" role=\"presentation\">du 24<\/span> <span dir=\"ltr\" role=\"presentation\">juillet 2015 a fix\u00e9<\/span><span id=\"p104R_mc11\" class=\"markedContent\"><\/span><span id=\"p104R_mc12\" class=\"markedContent\"><\/span> <span dir=\"ltr\" role=\"presentation\">sept finalit\u00e9s autorisant le <\/span><span dir=\"ltr\">recours aux outils les plus intrusifs. Celles-ci visent \u00e0<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">prot\u00e9ger<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">l\u2019ind\u00e9pendance de la nation<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><span dir=\"ltr\" role=\"presentation\">,<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">les int\u00e9r\u00eats <\/span><span dir=\"ltr\" role=\"presentation\">\u00e9conomiques<\/span> <\/em><span dir=\"ltr\" role=\"presentation\">\u00bb<\/span> <span dir=\"ltr\" role=\"presentation\">de la France, \u00e0 pr\u00e9venir le terrorisme ou <\/span><span dir=\"ltr\" role=\"presentation\">encore la criminalit\u00e9 organis\u00e9e.<\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <em><span dir=\"ltr\" role=\"presentation\">Ce sont des formules <\/span><span dir=\"ltr\" role=\"presentation\">extr\u00eamement larges qui peuvent \u00eatre utilis\u00e9es par exemple <\/span><\/em><em><span dir=\"ltr\" role=\"presentation\">contre des militants \u00e9cologistes, comme on a d\u00e9j\u00e0 pu le <\/span><span dir=\"ltr\" role=\"presentation\">voir<\/span><\/em> <span dir=\"ltr\" role=\"presentation\">\u00bb<\/span><span dir=\"ltr\" role=\"presentation\">, souligne Estelle De Marco.<\/span><\/div>\n<div class=\"textLayer\" data-main-rotation=\"0\"><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">De plus, l\u2019activit\u00e9 des services de renseignement est <\/span><span dir=\"ltr\" role=\"presentation\">contr\u00f4l\u00e9e non pas par un magistrat judiciaire, mais par <\/span><span dir=\"ltr\" role=\"presentation\">une autorit\u00e9 administrative, la Commission nationale de <\/span><span dir=\"ltr\" role=\"presentation\">contr\u00f4le des techniques de renseignement (CNTCR).<\/span><br role=\"presentation\" \/><span dir=\"ltr\">En plus des techniques sp\u00e9ciales d\u2019enqu\u00eate et des divers <\/span><span dir=\"ltr\" role=\"presentation\">outils de piratage et d\u2019intrusion, les services de <\/span><span dir=\"ltr\" role=\"presentation\">renseignement peuvent demander un acc\u00e8s direct aux <\/span><span dir=\"ltr\" role=\"presentation\">donn\u00e9es de connexion d\u00e9tenues par les op\u00e9rateurs. Cet<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">acc\u00e8s peut m\u00eame se faire en temps r\u00e9el dans le cadre de <\/span><span dir=\"ltr\" role=\"presentation\">la pr\u00e9vention du terrorisme. Ils peuvent \u00e9galement <\/span><span dir=\"ltr\" role=\"presentation\">analyser les donn\u00e9es de connexion transitant sur <\/span><span dir=\"ltr\" role=\"presentation\">Internet en y installant les fameuses<\/span><span id=\"p138R_mc0\" class=\"markedContent\"><\/span><span id=\"p138R_mc1\" class=\"markedContent\"><\/span> <span dir=\"ltr\" role=\"presentation\">\u00ab<\/span> <span dir=\"ltr\" role=\"presentation\">bo\u00eetes noires<\/span> <span dir=\"ltr\" role=\"presentation\">\u00bb.<\/span><span id=\"p138R_mc2\" class=\"markedContent\"><\/span><span id=\"p138R_mc3\" class=\"markedContent\"><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>LIBERT\u00c9S PUBLIQUES &#8211; Police, justice : qui peut acc\u00e9der aux messageries priv\u00e9es ? J\u00e9r\u00f4me Hourdeaux &#8211; 2 septembre 2024 &#8211; M\u00e9diapart &#8211; article complet Mediapart fait le point sur le droit applicable en mati\u00e8re d\u2019acc\u00e8s judiciaire aux donn\u00e9es de connexion ou aux communications \u00e9chang\u00e9es via des services tels que Telegram.S i Pavel Durov, le patron [&hellip;]<\/p>\n","protected":false},"author":8752,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,14,3,10],"tags":[],"class_list":["post-2736","post","type-post","status-publish","format-standard","hentry","category-enfermements","category-lecture","category-nouvelles-lois","category-prevention"],"_links":{"self":[{"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/2736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=\/wp\/v2\/users\/8752"}],"replies":[{"embeddable":true,"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2736"}],"version-history":[{"count":2,"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/2736\/revisions"}],"predecessor-version":[{"id":2738,"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/2736\/revisions\/2738"}],"wp:attachment":[{"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tardigrada.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}