Vulnerabilities / Threats
5/1/2014
02:35 PM
50%
50%

Snowden NSA Revelations Complicate European Privacy Law Reboot

As European legislators work to rewrite privacy laws, one security expert says a full fix requires Europe to offer local alternatives to Google, Microsoft, and other US online services.

InfoSecurity Europe -- London -- The leak of top-secret information pertaining to the National Security Agency's surveillance programs last year by Edward Snowden continues to have political ramifications throughout Europe and especially at the Brussels headquarters of the European Union.

That fact was brought home time and again by participants at this week's Infosecurity Europe conference in London.

Lead British data protection regulator David Smith, deputy commissioner at the UK Information Commissioner's Office, said that the revelations over the NSA's surveillance apparatus have contributed to a delay in the closely watched, ongoing rewrite of Europe's 1995 Data Protection Act. That law details both the privacy rights of European citizens and related rules that businesses must follow.

"There's no doubt it's had an effect on the negotiations," Smith said during a keynote presentation. "In one general way, it's just affected the climate in which the discussions in Brussels are taking place."

Last year, many EU officials hoped to hammer out new privacy rules before the end of 2013. Politicians have promised that the rules will cut compliance costs for businesses while increasing privacy protections for citizens. At the same time, the rules will likely force businesses to comply with more stringent standards on data protection, notification, and consent gathering.

But the "Snowden revelations," as Smith dubbed them, helped derail that timetable. "I'd be astounded if it gets passed this year, I think it might get passed next year in 2015, and then there will be two years, essentially, to bring it into force." But he cautioned that the rewrite process might well stretch further into the future. "Every prediction I've made on this, it's taken longer than I've suggested."

One wrinkle is that EU legislators, who tend to be quite focused on civil rights, have yet to agree on exactly how they should respond to the NSA surveillance revelations. "People are saying the new regulation should address the Snowden revelations and national security access, not just by the US," said Smith. "Trying to build that into the regulation is an added complication." The latest draft of the new law is already more complex than its 1995 predecessor.

From a privacy rights perspective, one complication for European lawmakers is the participation by many of their governments in the very same NSA programs. The Prism program, for example, is a joint effort by the "five eyes" electronic eavesdropping alliance: the United States, Australia, Canada, New Zealand, and the United Kingdom. Furthermore, the NSA and its five-eyes equivalents aren't the only signals intelligence agencies working in Europe.

"Every country has been at it, including the ones who want to get together and form coalitions to combat state-sponsored cybercrime," Graham Cluley, an independent security analyst, said during an Infosecurity Europe panel discussion on cybercrime. "I'm slightly amused by the fact that we have one booth here at the conference, who I won't name, but they're based in Cheltenham," he said, referring to the location of Government Communications Headquarters (GCHQ), the British signals intelligence agency. Snowden's leaks said that the agency used NSA-developed technology to hack into Belgium's largest telecommunications firm, Belgacom, and monitor its customers.

Likewise, Mikko Hypponen, chief research officer at F-Secure in Finland, said during a keynote presentation at the Infosecurity Europe conference that, even though it's easy to blame the United States for its "rude behavior" -- acting like it owns the Internet and "not respecting the privacy rights of foreigners, when we make up 96% of the planet" -- Europeans must also blame themselves.

"Many of these problems are the result of the fact that we Europeans have been unable to provide alternative services to these American services," Hypponen said, referencing the likes of Amazon, Apple, Facebook, Google, and Microsoft. Thus, even though many Europeans know full well that the US government has a legal right to access any information handled by domestic businesses -- be that data emails or location data -- they use the US services anyway.

Hypponen ascribed the problem in part to Europe too often failing to hang on to homegrown technical talent. "The very first thing they do when they start a company is, they move to Silicon Valley. That's how we, Europe, have failed."

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.