As the US debates privacy a Berlin start up surges with...
|
|
|
- June Ross
- 10 years ago
- Views:
Transcription
1 TOP STORIES / SCI-TECH DATA PROTECTION As the US debates privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services that - in some way - are tied up in surveillance. In Europe some are trying to get us to stop. The American tech industry is worried that the fall out from the NSA surveillance scandal could cost it $180 billion in lost business by roughly 25 percent of the information technology services market. Large companies are ostensibly fighting back. 1 von :30
2 Microsoft, for instance, has taken legal action to challenge US government demands for access to one of its customer's - data, which was stored outside of the US. The PC software maker's legal team wrote in its brief: "The government takes the extraordinary position that by merely serving such a warrant on a US-based provider, it has the right to obtain the private s of any subscriber, no matter where in the world the data may be located, and without the knowledge or consent of the subscriber or the relevant foreign government where the data is stored." Microsoft has also suggested that the US government may also be violating the constitution and breaching existing data sharing treaties it has made with other governments. And the case will have global implications, since so many of us - wittingly or not - use American and other cloud-based services. "Secure" But while this legal debate plays out in the US, companies in Europe are looking for solutions to the issue of "insecure" . One such company is Berlin-based Posteo. Co-founder Patrik Löhr says Posteo offers users complete anonymity. "You can anonymously create an account and pay for it anonymously," says Löhr. Ah. There's the rub. Secure costs. But Löhr says there's value in your money. Löhr says Posteo has seen a surge since the NSA scandal broke "Because we don't have any account data, we can't give it away, we can't lose it, no-one can hack us, or get the data from us or urge us to give the data away." A Posteo account costs between euros a year. They are ad-free and offer some degree of privacy. The company says it deletes credit card info after you pay. And if you're really concerned about your credit privacy, you can mail Posteo cash. About 20 percent of users have opened their accounts this way. 2 von :30
3 Löhr says Posteo's emphasis on privacy has been key its growth. "From , we had from zero to 10,000 customers," Löhr says. "But last year, when [Edward] Snowden released his documents [about the NSA], we went from 10,000 to 60,000 customers. So it was a huge growth for us." Ignore your concerns? Posteo's business model is reminiscent of the early 1990s, when lots of local players offered services - some, at cost. And they were then overtaken by "free" services, such as Yahoo and Google. It's unclear whether Posteo will kick-start a revival of paid, local services. But many experts feel most of us will continue to use Gmail and others like it - despite our concerns over privacy or these companies' advertising-driven thirst for our data. Sabrina Löhr co-founded Posteo with her husband Patrick in 2009 Data protection experts in Germany, for their part, say they have been expecting a test case, such as the one launched by Microsoft in the US. American providers want to clarify how they stand legally in the EU and the US - and how they can reconcile the various positions and requirements. "The American government says it has the right to demand data from any American company, and its subsidiaries, even if the company stores that data outside the US," says Thomas Kranig of the Bavarian data protection office. "So, for instance, Microsoft's European operations can't ignore a US government warrant. But at the same time, EU law forbids companies to give the state access to data without a clearly established legal need. And that's why I've said these companies are in a bind: are they going to break American law or EU law?" No matter what the answer is Germany is seeing a solid trend of people switching to more privacyconscious providers. DW RECOMMENDS After NSA scandal, United States may grant EU citizens data privacy The Obama administration will push to allow EU citizens the right to sue in US courts if they think their data has been misused. Vast US spying programs have complicated transatlantic ties at a delicate moment. ( ) New leaks show Germany's collusion with NSA Several new Snowden-leaked documents show how closely Germany's intelligence agencies work with the NSA. 3 von :30
4 But did the German government deliberately soften laws protecting privacy to make life easier for them? ( ) WWW LINKS Posteo AUDIOS AND VIDEOS ON THE TOPIC Listen to the report on Spectrum Date Author Michael Scaturro, Berlin Editor Zulfikar Abbany Related Subjects National Security Agency (NSA), Edward Snowden, Google, Scene in Berlin Keywords , Posteo, Berlin, surveillance, secure, data privacy, Internet, NSA, Edward Snowden, Michael Scaturro Spectrum Share Send Facebook Twitter Google+ More Feedback: Send us an . Please include your name and country in your reply. Print Print this page Permalink RELATED CONTENT Russia tightens Internet screws with 'server law' In Russia, a bill that would require personal data collected by Internet EU mulls cyber defense against US surveillance Through its cyber security strategy, the EU has pushed its member Spiegel: Intel agency suspected in alleged phone hacks of MPs Two German parliamentarians suspect that their phones were 4 von :30
5 companies to remain on servers in the country has passed the lower house of parliament. Critics say it isn't about data protection at all. states to bolster their defenses against digital attacks. But after the Snowden revelations, will this strategy include measures against US espionage? tapped by an intelligence agency, according to Der Spiegel. The allegations come amid a diplomatic row between Berlin and Washington over US espionage. MORE CONTENT New drug combination against TB raises hopes for drug-resistant and co-infected HIV patients Researchers presented results from a TB drug trial at the AIDS conference in Melbourne. They say the new drug combination could provide new hope for patients with both tuberculosis and HIV. When networks turn deadly Researchers have shown that hackers can use computer viruses to crash cars. In a world where a growing number of devices are connected via the Internet, there could be a growing danger of such attacks. HIV research and action in light of tragedy At least six top AIDS experts were killed in the Malaysia Airlines passenger plane crash. The International AIDS Conference is taking place regardless - DW reviews the key topics being discussed. 5 von :30
The Year 2013 Has Become 1984
The Year 2013 Has Become 1984 Saturday, September 21, 2013 23:33 idiscovery Solutions Tom Matzen The Editor interviews Tom Matzen, Director at idiscovery Solutions, in charge of the firm s International
AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH
AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view
Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015
Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:
Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy
Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the
Research Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015
The Impact of Computer Engineering 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 2 Introduction My research project included: Talking
the Council of Councils initiative
Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global
Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data
Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally
Online Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications
Brussels, October 8 th 2008 Online Security, Traffic Data and IP Addresses Review of the Regulatory Framework for Electronic Communications Francisco Mingorance Senior Director Government Affairs [email protected]
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
Keren Elazari Hackers: The Internet s Immune System
Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think
Offensive capabilities
Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and
Data privacy and security in the post-snowden era
Data privacy and security in the post-snowden era Matthew D. Sarrel, CISSP August 22, 2014 This report is underwritten by Verne Global. TABLE OF CONTENTS Executive summary... 3 Situational analysis...
Cloud storage buyer s guide
Cloud storage buyer s guide for small business sponsored by 1 Table of contents Why should you read this guide? 3 Step 1: Decide how much security you need 4 Step 2: Consider what you need cloud storage
Statement on the general concept of the European Union towards Data Protection by Aktion Freiheit statt Angst e.v.; EU Register ID 17019643006-45
Berlin, 10. Januar 2011 Aktion Freiheit statt Angst Rochstr. 3 Directorate-General Justice Unit C3 Data protection European Commission B - 1049 Brussels Statement on the general concept of the European
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure
ICPAK ANNUAL FORENSIC AUDIT CONFERENCE Digital Forensics in Fraud & Corruption Investigations 9 October 2014 Leisure Lodge Hotel, Diani Kenya Faith Basiye, CFE Head Group Forensic Services KCB Banking
Privacy & Data Security: The Future of the US-EU Safe Harbor
Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT
Securing our information we have the technology; we just have to have the will to do it
Interview with Arjen Kamphuis, information technology specialist Securing our information we have the technology; we just have to have the will to do it Author: Valentina Novak "The hackers need you as
Accession to Convention 108: Benefits and Commitments. Marc Rotenberg, President Electronic Privacy Information Center Washington, DC
Accession to Convention 108: Benefits and Commitments Marc Rotenberg, President Electronic Privacy Information Center Washington, DC Convention 108: From a European Reality to Global Treaty Strasbourg,
Electronic Health Records: Challenges for Patient Privacy & Security Transcript
Electronic Health Records: Challenges for Patient Privacy & Security Transcript Part 1: Technical, Social, and Political Hurdles Julia Allen: Welcome to CERT's Podcast Series: Security for Business Leaders.
Presented by: Pikr.co.za Contact us: [email protected] Visit us: www.pikr.co.za
Presented by: Pikr.co.za Contact us: [email protected] Visit us: www.pikr.co.za 1 Do you KNOW what is being said about YOUR business online? In the age of social media and technology, it is sometimes easy
Big Data Big Security Problems? Ivan Damgård, Aarhus University
Big Data Big Security Problems? Ivan Damgård, Aarhus University Content A survey of some security and privacy issues related to big data. Will organize according to who is collecting/storing data! Intelligence
Patriot Act Impact on Canadian Organizations Using Cloud Services
Patriot Act Impact on Canadian Organizations Using Cloud Services November 8, 2013 By Scott Wright The Streetwise Security Coach http://www.securityperspectives.com 1 PRESENTATION TITLE Why do nation-states
Context. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world
To cloud or not to cloud, that is a very serious question EEMA / TrustCore Legal challenges in a post Safe Harbour and pre GDPR cloud world 18 November 2015 [email protected] Context Major cloud providers
NSA Surveillance, National Security and Privacy
NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM
BCS, The Chartered Institute for IT Consultation Response to:
BCS, The Chartered Institute for IT Consultation Response to: A Comprehensive Approach to Personal Data Protection in the European Union Dated: 15 January 2011 BCS The Chartered Institute for IT First
How To Get A Law Passed In The United States
HARVARD MODEL CONGRESS SAN FRANCISCO 2015 BRIEFING SUMMARIES A Memo for Members of the Presidential Cabinet RECENT UPDATES CIA - Cyber Hacking The CIA is concerned about cyberhacking because it has the
"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure
ICPAK ANNUAL FORENSIC AUDIT CONFERENCE Digital Forensics in Fraud & Corruption Investigations 9 October 2014 Leisure Lodge Hotel, Diani Kenya Faith Basiye, CFE Head Group Forensic Services KCB Banking
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked
What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails
2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1
Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law
Case Study: Cyber Stalking and Spyware in Divorce Cases
Case Study: Cyber Stalking and Spyware in Divorce Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.
Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror
Cybersecurity Primer
Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers
F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations
Brussels, 24 March 2014 140324/01 F A C T S H E E T EU-US Summit (Brussels, 26 March 2014) and EU-US relations The Leaders of the European Union and the United States of America will meet on 26 March 2014
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
White Paper - Crypto Virus. A guide to protecting your IT
White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra
Hyper-connectivity and Artificial Intelligence
Hyper-connectivity and Artificial Intelligence How hyper-connectivity changes AI through contextual computing Chuan (Coby) M 04/03/15 Description of Major Sections Background Artificial intelligence (AI)
IT Security Quo Vadis?
Munich IT Security Research Group IT Security Quo Vadis? Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences [email protected] http://muse.bayern Prof. Dr.-Ing. Hans-Joachim
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
Surviving the Era of Hack Attacks Cyber Security on a Global Scale
Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This
POSEIDON social network for carers
PersOnalized Smart Environments to increase Inclusion of people with DOwn s syndrome Deliverable D5.5 POSEIDON social network for carers Call: Objective: FP7- ICT- 2013-10 ICT- 2013.5.3 ICT for smart and
CYBER SECURITY THREAT REPORT Q1
CYBER SECURITY THREAT REPORT Q1 Moving Forward Published by UMC IT Security April 2015 0 U.S. computer networks and databases are under daily cyber-attack by nation states, international crime organizations,
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:
INTRODUCTION DO YOU NEED A LAWYER?
INTRODUCTION The purpose of this handbook is to provide answers to some very basic questions that inmates or inmates families might have regarding the processes of the criminal justice system. In no way
Dutch Data Protection Authority - Annual Report 2014
Dutch Data Protection Authority - Annual Report 2014 Foreword October 2015 holds some very exciting days in store for everyone close to the Dutch Data Protection Authority (Dutch DPA) [College bescherming
Global Information Society Watch 2014
Global Information Society Watch 2014 Communications surveillance in the digital age This report was originally published as part of a larger compilation, which can be downloaded from GISWatch.org Association
If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses
2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Cybersecurity. Canisius College
Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
