As the US debates email privacy a Berlin start up surges with...

Similar documents
The Year 2013 Has Become 1984

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Research Note Engaging in Cyber Warfare

The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015

the Council of Councils initiative

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

Online Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Keren Elazari Hackers: The Internet s Immune System

Offensive capabilities

Data privacy and security in the post-snowden era

Cloud storage buyer s guide

Statement on the general concept of the European Union towards Data Protection by Aktion Freiheit statt Angst e.v.; EU Register ID

Cyber Security Awareness. Internet Safety Intro.

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Privacy & Data Security: The Future of the US-EU Safe Harbor

Securing our information we have the technology; we just have to have the will to do it

Accession to Convention 108: Benefits and Commitments. Marc Rotenberg, President Electronic Privacy Information Center Washington, DC

Electronic Health Records: Challenges for Patient Privacy & Security Transcript

Presented by: Pikr.co.za Contact us: Visit us:

Big Data Big Security Problems? Ivan Damgård, Aarhus University

Patriot Act Impact on Canadian Organizations Using Cloud Services

Context. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world

NSA Surveillance, National Security and Privacy

BCS, The Chartered Institute for IT Consultation Response to:

How To Get A Law Passed In The United States

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious s

Michael Yakushev PIR-Center, Moscow (Russia)

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

Cyber Diplomacy A New Component of Foreign Policy 6

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING

Case Study: Cyber Stalking and Spyware in Divorce Cases

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Cybersecurity Primer

F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations

Cyber Security Strategy for Germany

White Paper - Crypto Virus. A guide to protecting your IT

Hyper-connectivity and Artificial Intelligence

IT Security Quo Vadis?

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

POSEIDON social network for carers

CYBER SECURITY THREAT REPORT Q1

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

INTRODUCTION DO YOU NEED A LAWYER?

Dutch Data Protection Authority - Annual Report 2014

Global Information Society Watch 2014

If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Cybersecurity. Canisius College

Cybercrime: risks, penalties and prevention

ITAR Compliance Best Practices Guide

Transcription:

TOP STORIES / SCI-TECH DATA PROTECTION As the US debates email privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services that - in some way - are tied up in surveillance. In Europe some are trying to get us to stop. The American tech industry is worried that the fall out from the NSA surveillance scandal could cost it $180 billion in lost business by 2016 - roughly 25 percent of the information technology services market. Large companies are ostensibly fighting back. 1 von 5 21.07.14 14:30

Microsoft, for instance, has taken legal action to challenge US government demands for access to one of its customer's email - data, which was stored outside of the US. The PC software maker's legal team wrote in its brief: "The government takes the extraordinary position that by merely serving such a warrant on a US-based email provider, it has the right to obtain the private emails of any subscriber, no matter where in the world the data may be located, and without the knowledge or consent of the subscriber or the relevant foreign government where the data is stored." Microsoft has also suggested that the US government may also be violating the constitution and breaching existing data sharing treaties it has made with other governments. And the case will have global implications, since so many of us - wittingly or not - use American email and other cloud-based services. "Secure" email But while this legal debate plays out in the US, companies in Europe are looking for solutions to the issue of "insecure" email. One such company is Berlin-based Posteo. Co-founder Patrik Löhr says Posteo offers users complete anonymity. "You can anonymously create an email account and pay for it anonymously," says Löhr. Ah. There's the rub. Secure email costs. But Löhr says there's value in your money. Löhr says Posteo has seen a surge since the NSA scandal broke "Because we don't have any account data, we can't give it away, we can't lose it, no-one can hack us, or get the data from us or urge us to give the data away." A Posteo account costs between 12-25 euros a year. They are ad-free and offer some degree of privacy. The company says it deletes credit card info after you pay. And if you're really concerned about your credit privacy, you can mail Posteo cash. About 20 percent of users have opened their accounts this way. 2 von 5 21.07.14 14:30

Löhr says Posteo's emphasis on privacy has been key its growth. "From 2009-13, we had from zero to 10,000 customers," Löhr says. "But last year, when [Edward] Snowden released his documents [about the NSA], we went from 10,000 to 60,000 customers. So it was a huge growth for us." Ignore your concerns? Posteo's business model is reminiscent of the early 1990s, when lots of local players offered email services - some, at cost. And they were then overtaken by "free" services, such as Yahoo and Google. It's unclear whether Posteo will kick-start a revival of paid, local email services. But many experts feel most of us will continue to use Gmail and others like it - despite our concerns over privacy or these companies' advertising-driven thirst for our data. Sabrina Löhr co-founded Posteo with her husband Patrick in 2009 Data protection experts in Germany, for their part, say they have been expecting a test case, such as the one launched by Microsoft in the US. American email providers want to clarify how they stand legally in the EU and the US - and how they can reconcile the various positions and requirements. "The American government says it has the right to demand data from any American company, and its subsidiaries, even if the company stores that data outside the US," says Thomas Kranig of the Bavarian data protection office. "So, for instance, Microsoft's European operations can't ignore a US government warrant. But at the same time, EU law forbids companies to give the state access to data without a clearly established legal need. And that's why I've said these companies are in a bind: are they going to break American law or EU law?" No matter what the answer is Germany is seeing a solid trend of people switching to more privacyconscious email providers. DW RECOMMENDS After NSA scandal, United States may grant EU citizens data privacy The Obama administration will push to allow EU citizens the right to sue in US courts if they think their data has been misused. Vast US spying programs have complicated transatlantic ties at a delicate moment. (25.06.2014) New leaks show Germany's collusion with NSA Several new Snowden-leaked documents show how closely Germany's intelligence agencies work with the NSA. 3 von 5 21.07.14 14:30

But did the German government deliberately soften laws protecting privacy to make life easier for them? (21.06.2014) WWW LINKS Posteo AUDIOS AND VIDEOS ON THE TOPIC Listen to the report on Spectrum Date 26.06.2014 Author Michael Scaturro, Berlin Editor Zulfikar Abbany Related Subjects National Security Agency (NSA), Edward Snowden, Google, Scene in Berlin Keywords email, Posteo, Berlin, surveillance, secure, data privacy, Internet, NSA, Edward Snowden, Michael Scaturro Spectrum Share Send Facebook Twitter Google+ More Feedback: Send us an e-mail. Please include your name and country in your reply. Print Print this page Permalink http://dw.de/p/1cqja RELATED CONTENT Russia tightens Internet screws with 'server law' 11.07.2014 In Russia, a bill that would require personal data collected by Internet EU mulls cyber defense against US surveillance 03.07.2014 Through its cyber security strategy, the EU has pushed its member Spiegel: Intel agency suspected in alleged phone hacks of MPs 14.07.2014 Two German parliamentarians suspect that their phones were 4 von 5 21.07.14 14:30

companies to remain on servers in the country has passed the lower house of parliament. Critics say it isn't about data protection at all. states to bolster their defenses against digital attacks. But after the Snowden revelations, will this strategy include measures against US espionage? tapped by an intelligence agency, according to Der Spiegel. The allegations come amid a diplomatic row between Berlin and Washington over US espionage. MORE CONTENT New drug combination against TB raises hopes for drug-resistant and co-infected HIV patients 21.07.2014 Researchers presented results from a TB drug trial at the AIDS conference in Melbourne. They say the new drug combination could provide new hope for patients with both tuberculosis and HIV. When networks turn deadly 20.07.2014 Researchers have shown that hackers can use computer viruses to crash cars. In a world where a growing number of devices are connected via the Internet, there could be a growing danger of such attacks. HIV research and action in light of tragedy 20.07.2014 At least six top AIDS experts were killed in the Malaysia Airlines passenger plane crash. The International AIDS Conference is taking place regardless - DW reviews the key topics being discussed. 5 von 5 21.07.14 14:30