EU-US Safe Harbour For Personal Data Eliminated

The European Court of Justice (CJEU) handed down a decision declaring EU-US safe harbour for personal data invalid this morning. It has far-reaching implications for cloud services in particular and may presage increased opportunity for open source solutions from non-US suppliers. Looks like a real gift to companies like Kolab.

Here’s my first reaction on reading of the sources. Let me know what I have wrong & I’ll fix it. In the Opinion of the Advocate General (who has a broader but compatible view), he said:

¶183. I am therefore of the view that Decision 2000/520 must be declared invalid since the existence of a derogation which allows in such general and imprecise terms the principles of the safe harbour scheme to be disregarded prevents in itself that scheme from being considered to ensure an adequate level of protection of the personal data which is transferred to the United States from the European Union.

The court supported that view. That decision strikes down the “Safe Harbour” arrangement that allows companies to treat the USA as equivalent to a European state for the purposes of data protection and privacy.

How The Harbour Broke

Why did they reach that decision? The discussion by the Advocate General is more enlightening than the court, which simplified the matter. The core reason for the AG is that the USA has been found to perform indiscriminate mass surveillance against non-citizens. The key discussion is in paragraphs 198-202:

¶198. I note, in that regard, that the access which the United States intelligence authorities may have to the personal data transferred covers, in a generalised manner, all persons and all means of electronic communication and all the data transferred, including the content of the communications, without any differentiation, limitation or exception according to the objective of general interest pursued. (79)

¶199. Indeed, the access of the United States intelligence services to the data transferred covers, in a comprehensive manner, all persons using electronic communications services, without any requirement that the persons concerned represent a threat to national security. (80)

¶200. Such mass, indiscriminate surveillance is inherently disproportionate and constitutes an unwarranted interference with the rights guaranteed by Articles 7 and 8 of the Charter.

¶201. As the Parliament has correctly observed in its observations, since it is excluded for the EU legislature or the Member States to adopt legislation, contrary to the Charter, providing for mass and indiscriminate surveillance, it must follow, a fortiori, that third countries cannot under any circumstances be regarded as ensuring an adequate level of protection of personal data of citizens of the Union where their rules of law do in fact permit the mass and indiscriminate surveillance and interception of such data.

¶202. It should be emphasised, moreover, that the safe harbour scheme, as defined in Decision 2000/520, does not contain appropriate guarantees for preventing mass and generalised access to the transferred data.

Further, the AG found (and the Court agreed) that, while there are mechanisms to ensure that the declaration of safe harbour itself is valid (¶19), there is no authority ensuring that any necessary exceptions to privacy once the data is shared in the USA are appropriate and proportionate:

¶208. It should therefore be found that within the safe harbour scheme provided for by Decision 2000/520 there is no independent authority capable of verifying that the implementation of the derogations from the safe harbour principles is limited to what is strictly necessary. Yet we have seen that such control by an independent authority is, from the point of view of EU law, an essential component of the protection of individuals with regard to the processing of personal data.

He also found that there is no way for European citizens to intervene in the abuse of their personal data by the US authorities as there is for them in Europe.

¶212. Furthermore, the Commission has itself pointed out that there are no opportunities for citizens of the Union to obtain access to or rectification or erasure of data, or administrative or judicial redress with regard to collection and further processing of their personal data taking place under the United States surveillance programmes.
¶213. It should be observed, last, that the United States rules on the protection of privacy may be applied differently to United States citizens and to foreign citizens.

They found that the European Commission should itself have reviewed and suspended the safe harbour, particularly in the light of the (largely undisputed) revelations by Edward Snowden of indiscriminate mass surveillance of foreign nationals by the NSA. The court also found that the lack of any competent authority to supervise the safe harbour arrangements and hear binding appeals made 2000/520 invalid anyway.

Questions directly arising

  • Can any EU company now legally engage a US supplier for cloud or web application services, given relationships with US authorities are beyond contractual remedy?
  • If they do, is consent from every data subject necessary?
  • Given US courts claim jurisdiction over any subsidiary of a US corporation regardless of location even without routine data transfer to the USA, can any EU business use the services of a US company even when the work is conducted entirely in Europe?
  • If they do, is consent from every data subject necessary?
  • If the EC made a fresh determination to replace 2000/520, would that heal everything given the existence of NSA surveillance is unlikely to disappear?
  • Can any remedy be made until the US gives EU citizens standing to challenge use of their personal data in the USA in its courts?
  • If it does, will the EC need to regularly re-evaluate its determinations?

The Storm That Broke The Harbour

The journey to that decision is itself important. The original question asked by the High Court of Ireland concerned whether the Data Protection Commission for Ireland was entitled to make any rulings at all about the efficacy of safe harbour given the European Commission had already made a Union-wide declaration, “in the light of factual developments in the meantime since that Commission Decision was first published.”

This took place during the final appeal phase of a claim in Ireland by Maximillian Schrems of Austria that the sharing of his personal data by Facebook Ireland with its parent company Facebook Inc was in breach of European data protection despite Facebook’s compliance with the safe harbour arrangements. The Irish Data Protection Commissioner had dismissed the claim, but Schrems won judicial review of the decision on the basis that the revelations of Edward Snowden revealed the safe harbour was not in fact adequate for data protection.

The Irish High Court itself found important facts. First, it established that Snowden’s revelations should be considered factual:

¶36. According to the High Court, it is clear from the extensive exhibits accompanying the affidavits filed in the main proceedings that the accuracy of much of Edward Snowden’s revelations is not in dispute. The High Court therefore concluded that, once personal data is transferred to the United States, the NSA and other United States security agencies such as the Federal Bureau of Investigation (FBI) are able to access it in the course of a mass and indiscriminate surveillance and interception of such data.

Were the only issue the law of Ireland, there would have been no need for clarification:

¶37. The High Court notes that in Irish law the importance of the constitutional rights to privacy and to inviolability of the dwelling requires that any interference with those rights be in accordance with the law and proportionate. The mass and undifferentiated accessing of personal data does not satisfy the requirement of proportionality and must therefore be considered contrary to the Constitution of Ireland.

But the Irish Commissioner had asserted that, since the European Commission had already asserted the existence of a safe harbour, he could not intervene on behalf of Schrems.

¶50. The Commissioner considered that the very existence of a Commission decision recognising that the United States ensures an adequate level of protection under the safe harbour scheme prevented him from investigating the complaint.

As a result, the CJEU had first to decide whether a national data protection authority was pre-empted by the European Commission. If it was not, it then had to decide whether, in the vase of the US safe harbour, a national authority should in fact override the EC safe harbour. as explained above, the latter decision was indeed taken;

… a decision … such as Commission Decision 2000/520/EC … on the adequacy of the protection provided by the safe harbour privacy principles … does not prevent a supervisory authority of a Member State … from examining the claim of a person concerning the protection of his rights and freedoms in regard to the processing of personal data relating to him

That has to also raise questions within Europe. Given GCHQ also allegedly engages in mass surveillance, are transfers between, say, Germany and the UK, also safe transfers? Having established that national authorities retain sovereignty, surely some could now start questioning transfers across the Union as well as those outside it?

DLC 1: Hotel arrogance, the no-win laptop and more

Meshed Insights Ltd

Digital Life Clippings from week 1

  1. Marriott will ban shareable WiFi if the FCC don’t let them block itNYT – Their arrogance in attempting to protect their high-margin abuse of customers’ vulnerability knows no bounds; threatening the FCC is jaw-dropping.
    To carry out their threat to ban shareable WiFi, they would need to ban not only MiFis but also Windows, Mac and Linux laptops as well as almost all smartphones. They may think they have a right to break my internet if I won’t use their broken internet, but the “hospitality” they will need to show their “guests” will be deeply harmful.
    The bug is not that people want to use their own internet connections; it’s that Marriott think people should have to pay extra for a facility that’s become as fundamental to travellers as hot water or electric light. [Coverage]
  2. HP’s low-cost Windows laptop is…

View original post 275 more words

Digital Life Clippings – New Year’s News

I’ll keep reposting these here for a while longer…

Meshed Insights Ltd

  1. Indian government blocks programming web sites, including archive.org and Github gists – TechCrunch – As if to illustrate why it’s bad to allow anyone the power to block web sites arbitrarily, the Indian government has blocked entire slices of web infrastructure because one of their functionaries found something about ISIS somewhere on it. More on the blog.
  2. Marriott wants to block your devices so you have to pay for their wifiBoing Boing – Marriott clearly does not want anyone from the technology industry to stay at their hotels or to use them for events. Best to respect their wishes and avoid them like the plague.
  3. End-user adoption of open source is a lousy metricRRW – Open source is primarily a collaboration technique, leveraging the permission-in-advance arising from software freedom to unlock innovation in many unrelated deployers. For many reasons, enterprise end-user deployment of unmodified…

View original post 143 more words

Digital Life Clippings – Christmas Break Edition

Meshed Insights Ltd

  1. Police called to remove pre-teens just in case they pirated Hunger Games movie with cellphonesArs Technica – Given the storyline of the movie, this is ironic. Cineworld thinks copyrights are so precious it’s worth infringing common sense and individual rights to protect them. They think paying customers are criminals until proven otherwise, even kids. Don’t let any kids you care about watch movies at a cinema with this attitude, it’s not safe.
  2. The most wasteful patent aggression strategy ever has failedArs Technica – Another skirmish in the ongoing dirty war by the legacy technology & media industry against Google bites the dust.
  3. NSA dumps incriminating documents on Christmas EveBoing Boing – Anyone who doubts the effectiveness of Freedom of Information requests should see how government agencies squirm responding to them.
  4. Inadvertent Algorithmic CrueltyMeyerWeb – Facebook’s Year In Review is a product of…

View original post 65 more words

Top Clippings For December 18th

Let me know if you like this…

Meshed Insights Ltd

  1. Samsung shuts down ChatOnCNet – If only there was a way for their customers to uninstall their impotent self-defence against Google.
  2. EU software procurement breaches rules more than ever beforeOFE PDF – Because they really do prefer to feed what they perceive as corporate power brokers rather than work to create European value with European money.
  3. EU allocates half million euros for testing open sourceFSFE – It’s a rounding error on the budget, but at least it’s something. Let’s see who gets it.
  4. Apache finally publishes a code of conductBlog, Code – Fine work, but no really defence against those gaming the system.

View original post

On Terrorism

Some politicians seem to act as if “terrorism” means a terrible crime committed by someone who doesn’t fit the speaker’s own racial & religious profile. Just because something induces terror in some or many people, that doesn’t make it terrorism. That diminishes the concept as well as grouping routine crime – for which society has millennia of experience and solutions – into the same bucket as a more subtle and serious phenomenon that preys on the meshed society.

Terrorism isn’t just performing a terrifying act. It’s provoking society’s immune system into attacking itself, making its defence systems attack the values and people they are supposed to be defending. Terrorism is an autoimmune disorder of democracy. You don’t fight terrorism by attacking the virus; you fight it by strengthening the immune system.

Behind The Bullying Epidemic

I was very sad to hear that Kathy Sierra has decided to withdraw from online interactions again. Her insights into how technical communication and collaboration happen are among the finest I have read, and losing her voice again is a tragedy. But the reason she has gone hurts us all too. Reading her explanation is very depressing. Her conclusion — that what she experienced is not a one-off event but an expected outcome — would be worrying even if it was just about her.

But it’s not.

While hyperbolic and perhaps narrow in naming Linus Torvalds, there’s a seed of truth in what Lennart Poettering says about the tendency for open source communities to amplify toxic people. That’s not uniquely because they are open source communities, though. It’s because they communicate online, with the scale that permits the overwhelming numbers to drown out any residual social brakes that would normally apply to in-person interactions.

It would be easy to assume how Kathy has been treated is purely a gender issue. But I don’t believe it is. There are sometimes female attackers too and the analysis Kathy provides suggests the effect is one of a critical mass of angst being catalysed by a sociopath. There’s no doubt sexism is a frequent key factor for the catalyst — “that woman doesn’t deserve to be right” — but catalyst role is itself gender independent and so is the angst-cloud. Gender and race dominate the ways victims are tormented to be sure, but it’s a mistake to let the undeniable misogyny of the mob define the root cause.

Online Outgroups

Drawing all these threads together for me is a long, fascinating article (h/t Alec) that makes me wonder if we are seeing the formation of outgroups in these incidents. Scott Alexander’s essay talks about red, blue and grey groupings of almost-identical people differentiated by some of the details of their political ideology such as their expectations of causality. He suggests the greatest risks come not from people who are very different, but rather from those who are almost the same.

I wonder if the socipathic hordes are the result of an online outgroup reaching critical mass? They could be Alexander’s Grey Tribe, or it could be the effect he describes is an expected behaviour of large groups of humans. Just as Fowler’s Stages of Faith seem to apply to all belief systems and not just religion, so it seems likely people can belong to many different outgroups in different parts of their lives.

Kathy suggests the catalyst is privilege envy. Her tormentors seem to think she has a privileged position she does not deserve and attack her without restraint; I bet they have that view based on more than just her gender. If that’s the case, it may not much matter which perceived privilege is the trigger, whether it’s gender, race, ethnicity, orientation or music choice. This is Alexander’s point; the smaller the difference, the worse the hate.

Whatever is going on, I also agree with Natasha Lennard that it’s a mistake to let any of these sociopaths (or the growds they catalyse) be socialised. It monstrous behaviour that must not be excused. Unlike Greg Sandoval I don’t think the perpetrators develop empathy or stop wanting to harm people. One friend suggests it’s a form of the “addictive righteous indignation” that David Brin writes about.

There is an irony that the people doing the bullying appear to be a group of people who themselves might have expected to be bullied, as the characters from Big Bang Theory are wont to observe — omegas becoming alphas and betas. It’s ongoing inadequacy recast in their minds as injustice, used to justify inhuman cruelty in the name of correcting a privilege imbalance. If you doubt there’s inhuman cruelty, watch Anita Sarkeesian’s XOXO talk.

As Paulo Friere once worried, are we seeing a group from the oppressed become oppressors instead of gaining empathy from their own experiences? Which, as Alexander ends up reflecting, points the finger backwards and as Pete Warden concludes tells us our toleration of asshole behaviour — from anyone regardless of their excuse — must end. The lulz do not justify the means.

[First posted on Ello]

Is Microsoft To Blame For Malware?

I am still writing a monthly column for Linux Voice Magazine, a new print publication that (in my view) is being done right. If you’re not a subscriber, you won’t’ve seen my article from issue 5 in which I explain why I believe Windows’ malware infestation arises from Microsoft’s technical decisions favouring marketing rather than security.

Meshed Insights Ltd

The action law enforcement services have taken against the GameOver-Zeus malware syndicate is great news for a change. In the UK, this was communicated with typical tabloid alarmism, framed as “two weeks to save the world” instead of “unusually effective action by law enforcement”. As a result, UK publications have been posting self-preservation information for their readers.

The BBC’s instructions start with the statement “If your computer does not run Windows, stop right here.” Users of other operating systems like Linux or ChromeOS have nothing to worry about this time, even if they are increasingly likely to be targeted elsewhere. As a result, some have asked whether Microsoft is to blame for all this malware.

View original post 725 more words

Heartbleed and Lessons Learned

Here’s my column from Issue 4 of Linux Voice magazine. Currently working on the column for issue 6.

Meshed Insights Ltd

HeartbleedWe’ve had some time for the shock of the Heartbleed announcement to sink in and there’s a lot to consider. While the first impressions might be about the serious, exploitable bug and the repercussions of its abuse, the incident casts light on both the value and risks of open source.

View original post 1,124 more words

%d bloggers like this: