Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Snowden NSA Revelations Complicate European Privacy Law Reboot

As European legislators work to rewrite privacy laws, one security expert says a full fix requires Europe to offer local alternatives to Google, Microsoft, and other US online services.

InfoSecurity Europe -- London -- The leak of top-secret information pertaining to the National Security Agency's surveillance programs last year by Edward Snowden continues to have political ramifications throughout Europe and especially at the Brussels headquarters of the European Union.

That fact was brought home time and again by participants at this week's Infosecurity Europe conference in London.

Lead British data protection regulator David Smith, deputy commissioner at the UK Information Commissioner's Office, said that the revelations over the NSA's surveillance apparatus have contributed to a delay in the closely watched, ongoing rewrite of Europe's 1995 Data Protection Act. That law details both the privacy rights of European citizens and related rules that businesses must follow.

"There's no doubt it's had an effect on the negotiations," Smith said during a keynote presentation. "In one general way, it's just affected the climate in which the discussions in Brussels are taking place."

Last year, many EU officials hoped to hammer out new privacy rules before the end of 2013. Politicians have promised that the rules will cut compliance costs for businesses while increasing privacy protections for citizens. At the same time, the rules will likely force businesses to comply with more stringent standards on data protection, notification, and consent gathering.

But the "Snowden revelations," as Smith dubbed them, helped derail that timetable. "I'd be astounded if it gets passed this year, I think it might get passed next year in 2015, and then there will be two years, essentially, to bring it into force." But he cautioned that the rewrite process might well stretch further into the future. "Every prediction I've made on this, it's taken longer than I've suggested."

One wrinkle is that EU legislators, who tend to be quite focused on civil rights, have yet to agree on exactly how they should respond to the NSA surveillance revelations. "People are saying the new regulation should address the Snowden revelations and national security access, not just by the US," said Smith. "Trying to build that into the regulation is an added complication." The latest draft of the new law is already more complex than its 1995 predecessor.

From a privacy rights perspective, one complication for European lawmakers is the participation by many of their governments in the very same NSA programs. The Prism program, for example, is a joint effort by the "five eyes" electronic eavesdropping alliance: the United States, Australia, Canada, New Zealand, and the United Kingdom. Furthermore, the NSA and its five-eyes equivalents aren't the only signals intelligence agencies working in Europe.

"Every country has been at it, including the ones who want to get together and form coalitions to combat state-sponsored cybercrime," Graham Cluley, an independent security analyst, said during an Infosecurity Europe panel discussion on cybercrime. "I'm slightly amused by the fact that we have one booth here at the conference, who I won't name, but they're based in Cheltenham," he said, referring to the location of Government Communications Headquarters (GCHQ), the British signals intelligence agency. Snowden's leaks said that the agency used NSA-developed technology to hack into Belgium's largest telecommunications firm, Belgacom, and monitor its customers.

Likewise, Mikko Hypponen, chief research officer at F-Secure in Finland, said during a keynote presentation at the Infosecurity Europe conference that, even though it's easy to blame the United States for its "rude behavior" -- acting like it owns the Internet and "not respecting the privacy rights of foreigners, when we make up 96% of the planet" -- Europeans must also blame themselves.

"Many of these problems are the result of the fact that we Europeans have been unable to provide alternative services to these American services," Hypponen said, referencing the likes of Amazon, Apple, Facebook, Google, and Microsoft. Thus, even though many Europeans know full well that the US government has a legal right to access any information handled by domestic businesses -- be that data emails or location data -- they use the US services anyway.

Hypponen ascribed the problem in part to Europe too often failing to hang on to homegrown technical talent. "The very first thing they do when they start a company is, they move to Silicon Valley. That's how we, Europe, have failed."

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/1/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Threat from the Internet--and What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15478
PUBLISHED: 2020-07-01
The Journal theme before 3.1.0 for OpenCart allows exposure of sensitive data via SQL errors.
CVE-2020-6261
PUBLISHED: 2020-07-01
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
CVE-2020-15471
PUBLISHED: 2020-07-01
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
CVE-2020-15472
PUBLISHED: 2020-07-01
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
CVE-2020-15473
PUBLISHED: 2020-07-01
In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c.