Despite the legal frameworks meant to govern and, in some cases, limit government access to personal data, governments in many regions have found ways to sidestep these laws or leverage existing loopholes to gain access to more extensive data than publicly disclosed. This section explores how each region could potentially bypass transparency laws, amplifying concerns about surveillance and user privacy.
1. United States: Broad Interpretations and Loopholes in Surveillance Laws
In the United States, laws such as the Foreign Intelligence Surveillance Act (FISA), the USA PATRIOT Act, and the CLOUD Act grant significant surveillance powers. The government has multiple avenues to bypass transparency requirements or gain access to additional data:
- Broad Scope of National Security Letters (NSLs): The FBI and other agencies can issue NSLs without a court order, demanding user information directly from tech companies. These NSLs come with gag orders, preventing companies from disclosing their existence to the public. While some reforms were introduced after the Snowden revelations, the sheer volume of NSLs and their lack of judicial oversight allows agencies to gather data with minimal transparency.
- Expansion Under the CLOUD Act: The CLOUD Act enables U.S. authorities to compel tech companies to provide data stored overseas. By establishing cross-border agreements with other governments, the U.S. can access foreign-stored data, bypassing local privacy laws and limitations on data access. This cross-border data-sharing could sidestep domestic laws in other countries, allowing U.S. agencies to access data without traditional legal hurdles.
Potential Bypass Mechanism: The broad powers of NSLs, paired with the CLOUD Act’s international reach, make it relatively easy for the U.S. government to bypass domestic transparency laws. By leveraging these tools, agencies can access and share data without the need for open court proceedings, reducing oversight and bypassing limitations meant to protect user privacy.
2. China: State-Owned Infrastructure and Obligatory Cooperation
In China, the legal framework already heavily favors state access to data, and government control over infrastructure facilitates data collection. Yet, even these laws have additional mechanisms that allow the government to access data beyond what is disclosed:
- Mandatory Cooperation from Tech Companies: The National Intelligence Law and Cybersecurity Law require that all companies support government intelligence activities when requested. Since the government can invoke national security as a reason at any time, tech companies in China are legally bound to hand over any data the government requests, often without a formal warrant or independent oversight.
- State-Controlled Digital Infrastructure: In addition to direct cooperation, China’s state-owned digital infrastructure, including telecommunications networks and internet service providers, allows the government to intercept and monitor data flows at multiple levels. By owning critical infrastructure, the government can bypass legal restrictions on data requests directly through network monitoring and surveillance systems.
Potential Bypass Mechanism: Given the government’s broad control over data infrastructure and mandatory cooperation laws, it is relatively straightforward for Chinese authorities to access any user data they desire. The government can bypass the need for tech companies’ compliance by utilizing its direct control over the infrastructure, making additional laws or transparency requirements nearly irrelevant.
3. European Union: Utilizing National Security Exceptions
While the European Union is known for its data protection standards, including the General Data Protection Regulation (GDPR), certain national security provisions offer a potential route for governments to bypass transparency:
- National Security Exceptions Under GDPR: Article 23 of GDPR allows EU member states to restrict data subject rights to protect national security, public order, and defense. This exception gives governments significant leeway to access data without notifying users or disclosing the scope of surveillance.
- Cross-Border Surveillance under the European Investigation Order (EIO): The European Investigation Order facilitates cross-border data-sharing for law enforcement investigations across EU member states. By invoking the EIO, governments within the EU can share data without adhering to the strict transparency standards of GDPR, bypassing regular data protection protocols under the guise of cooperation in criminal investigations.
Potential Bypass Mechanism: Governments in the EU can invoke national security exceptions to circumvent GDPR’s transparency requirements. Through the EIO, EU member states can also collaborate on data collection efforts, sidestepping regular privacy protections and accessing information without fully notifying users.
4. Turkey: Direct Control Through Data Localization
In Turkey, recent laws have granted the government extensive control over digital data and infrastructure, creating multiple pathways to bypass transparency requirements:
- Data Localization Requirements under Law No. 5651: By mandating that all data be stored locally, Turkey has direct access to data stored within its borders, making it easier to compel companies to share information without users’ knowledge. Even if companies wish to resist, they face potential throttling or shutdowns if they do not comply, limiting the possibility of transparency.
- State-Controlled Telecommunications Network: Turkey’s state-owned telecommunications providers allow the government to monitor internet traffic and data flows directly. Through these channels, Turkish authorities can bypass tech companies entirely, intercepting data at the infrastructure level and avoiding any need for tech company cooperation or user disclosure.
Potential Bypass Mechanism: By enforcing data localization laws and controlling major telecommunications networks, Turkish authorities can bypass tech companies’ data and transparency protocols. This direct access to local infrastructure and data centers gives the government unrestricted access to user information without oversight.
5. Russia: Control Through Data Localization and SORM
In Russia, the government utilizes data localization laws and a nationwide surveillance system, SORM, to ensure access to user data without requiring tech companies’ explicit cooperation or disclosure:
- Data Localization Law: This law requires tech companies to store Russian citizens’ data within Russia, giving the government direct control over data access. By requiring data to be stored locally, Russian authorities can obtain information directly from data centers without depending on tech companies’ willingness to comply.
- SORM Surveillance System: The System for Operative Investigative Activities (SORM) mandates that telecom and internet providers install monitoring equipment, allowing the Federal Security Service (FSB) to intercept all communications directly. SORM enables real-time data collection without needing additional court orders, effectively bypassing any requirement for transparency or accountability from tech companies.
Potential Bypass Mechanism: By combining data localization laws with the SORM infrastructure, Russian authorities can access user data without involving tech companies. This approach enables the government to bypass transparency requirements, giving them direct control over data access and collection.
6. Canada: National Security Exceptions and Informal Requests
Canada’s privacy framework includes robust protections, but certain national security clauses and informal practices enable government agencies to access data with limited transparency:
- National Security Provisions in CSE Act: The Communications Security Establishment Act (CSE Act) allows Canada’s signals intelligence agency to access data for national security purposes without full disclosure to users. The act also includes broad provisions for cooperation with other countries’ intelligence agencies, facilitating data-sharing without triggering Canada’s usual privacy requirements.
- Informal Data Sharing Under the Security of Canada Information Disclosure Act: The Security of Canada Information Disclosure Act allows Canadian government agencies to share information about individuals with tech companies when national security is at stake. This law allows for informal and untracked data-sharing between agencies and tech companies, bypassing the need for warrants or public disclosure.
Potential Bypass Mechanism: Through national security provisions in the CSE Act and informal data-sharing under the Security of Canada Information Disclosure Act, Canadian authorities can circumvent transparency requirements by invoking national security concerns, accessing user data without direct oversight.
7. India: Expansive Surveillance Powers Without Oversight
India’s expanding digital infrastructure and robust surveillance laws allow the government to access user data without the transparency requirements typically mandated under privacy regulations:
- Section 69 of the IT Act (2000): This provision enables the government to intercept, monitor, and decrypt digital information for reasons related to national security and public order. Section 69 imposes broad obligations on tech companies without requiring them to notify users or seek independent oversight, making it easier for the government to bypass transparency.
- Intermediary Guidelines and Ethics Code (2021): These guidelines require social media platforms to comply with government data requests, particularly in matters related to public order and national security. The rules also enable the government to issue gag orders, prohibiting companies from informing users when their data has been accessed.
Potential Bypass Mechanism: India’s government can use the broad surveillance powers granted under Section 69 and the Intermediary Guidelines to bypass transparency and access user data freely. The lack of oversight in the data-sharing process allows government agencies to act with minimal accountability, limiting companies’ ability to protect user privacy.
Conclusion: The Global Trend of Transparency Bypasses
Despite differences in legal frameworks, governments worldwide have mechanisms to bypass transparency standards and access user data through Big Tech. From broad national security exemptions in the EU and Canada to mandatory cooperation in China and Russia’s control over data localization, a common thread emerges: the erosion of transparency and oversight. These bypass mechanisms enable governments to access vast amounts of user data without the knowledge or consent of users, often compromising personal privacy and individual autonomy.
To counter these trends, establishing international transparency standards and clear guidelines on data access is essential. By implementing safeguards, we can create a system that respects user privacy while still addressing legitimate security concerns, ensuring that technology serves democratic values rather than undermining them.
References
- Foreign Intelligence Surveillance Act (FISA) and National Security Letters (NSLs) in the USA
- Electronic Frontier Foundation. «Foreign Intelligence Surveillance Act (FISA).» Available at: https://www.eff.org/issues/national-security-surveillance/fisa
- Electronic Frontier Foundation. «National Security Letters.» Available at: https://www.eff.org/issues/national-security-letters
- American Civil Liberties Union (ACLU). «Surveillance Under the USA PATRIOT Act.» Available at: https://www.aclu.org/issues/national-security/privacy-and-surveillance/surveillance-under-usa-patriot-act
- CLOUD Act and Cross-Border Data Access in the USA
- Center for Strategic & International Studies (CSIS). «The CLOUD Act and Data Privacy.» Available at: https://www.csis.org/analysis/cloud-act-and-data-privacy
- U.S. Department of Justice. «CLOUD Act Resources.» Available at: https://www.justice.gov/dag/cloudact
- China’s National Intelligence Law and Cybersecurity Law
- Council on Foreign Relations (CFR). «China’s Intelligence Law and Implications for Intellectual Property Theft.» Available at: https://www.cfr.org/backgrounder/chinas-intelligence-law-and-implications-intellectual-property-theft
- Lawfare Blog. «China’s New National Intelligence Law: From a Defense Law Perspective.» Available at: https://www.lawfareblog.com/chinas-new-national-intelligence-law-defense-perspective
- The Diplomat. «China’s Cybersecurity Law and Its Impact on Foreign Companies.» Available at: https://thediplomat.com/2021/06/chinas-cybersecurity-law-and-its-impact-on-foreign-companies/
- General Data Protection Regulation (GDPR) and National Security Exceptions in the EU
- European Commission. «General Data Protection Regulation (GDPR).» Available at: https://ec.europa.eu/info/law/law-topic/data-protection/eu-data-protection-rules_en
- European Union Agency for Fundamental Rights. «Mapping of Data Protection Laws in the EU and National Security Exemptions.» Available at: https://fra.europa.eu/en/publication/2020/mapping-national-security-exemptions-data-protection
- European Investigation Order (EIO) for Cross-Border Data Sharing in the EU
- Eurojust. «The European Investigation Order.» Available at: https://www.eurojust.europa.eu/european-investigation-order-eio
- European Parliamentary Research Service. «European Investigation Order in Criminal Matters.» Available at: https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2019)633157
- Turkey’s Internet Law (Law No. 5651) and Social Media Regulation Law
- Human Rights Watch. «Turkey’s Social Media Law: Free Speech at Risk.» Available at: https://www.hrw.org/news/2020/07/28/turkey-social-media-law-undermines-free-speech
- The Diplomat. «Turkey’s Expanding Grip on Social Media and Digital Control.» Available at: https://thediplomat.com/2020/10/turkeys-expanding-grip-on-social-media-and-digital-control/
- Privacy International. «Law No. 5651 and Data Localization in Turkey.» Available at: https://privacyinternational.org/explainer/4737/law-no-5651-and-data-localization-turkey
- Russia’s Data Localization Law and SORM Surveillance System
- Privacy International. «Russia’s Data Localization Law and SORM.» Available at: https://privacyinternational.org/node/1225
- Human Rights Watch. «Russia’s Internet Crackdown and Implications of SORM.» Available at: https://www.hrw.org/news/2019/03/18/russias-internet-crackdown
- Freedom House. «Russia’s System for Operative Investigative Activities (SORM) and Internet Surveillance.» Available at: https://freedomhouse.org/report/freedom-net/2018/russia
- Canada’s Communications Security Establishment Act (CSE Act) and Security of Canada Information Disclosure Act
- Government of Canada. «Communications Security Establishment Act.» Available at: https://www.cse-cst.gc.ca/en
- Office of the Privacy Commissioner of Canada. «Privacy in Canada and the Security of Canada Information Disclosure Act.» Available at: https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/privacy-laws-in-canada/
- Canadian Civil Liberties Association (CCLA). «Privacy and National Security in Canada: Concerns with the CSE Act.» Available at: https://ccla.org/our-work/privacy-and-national-security/
- India’s Section 69 of the IT Act and Intermediary Guidelines and Ethics Code
- The Diplomat. «India’s Surveillance State: Growing Power of the IT Act.» Available at: https://thediplomat.com/2021/04/indias-surveillance-state-growing-power/
- Internet Freedom Foundation. «Section 69 of the IT Act and Privacy Concerns in India.» Available at: https://internetfreedom.in/section-69-it-act-india/
- Human Rights Watch. «India’s New Intermediary Guidelines and Implications for Freedom of Expression.» Available at: https://www.hrw.org/news/2021/03/10/indias-new-intermediary-rules-threaten-privacy-and-free-expression
It’s made by Fausken with love and AI
Legg igjen en kommentar