1.
Introduction ^
Starting in June 2013, whistle blower Edward Snowden leaked multiple documents detailing the surveillance PRISM Programme of the United States National Security Agency (NSA).1 The impact of the leaks has been both economical, political and legal, and has been felt by countries around the globe. In a post-Snowden world, countries are facing critical questions about appropriate limits to state surveillance – particularly extraterritorial surveillance, privacy rights of citizens and foreigners, cybersecurity, and internet governance. In that regard, the post-Snowden reactions of Belgium, as a Member State of the European Union (EU), will reflect EU developments, such a the recent annulment of the EU Data Retention Directive by the European Court of Justice. The position of Belgium may be further influenced by the alleged involvement of the intelligency agency of another EU Member State, the United Kingdom's Government Communications Headquarters (GCHQ).
2.1.
India ^
2.2.
Belgium ^
Belgium is an important hub for the EU institutions, and for that reason also an interesting target for potential cyber-espionage. On several occasions, EU Officials have been reported as victims of spying activities, such as Herman Van Rompuy, President of the European Council.15 Nevertheless, the post-Snowden public response in Belgium has been remarkably weak in comparison with the public response in India. The post-Snowden public voice in Belgium was triggered in September 2013, when the news headlines focused on the hacking of the internal systems of Belgacom, Belgium’s largest telecom provider, and whose customers include the European institutions. The Belgian newspaper the Standaard referred to the alleged involvement of the NSA, and reported the targeting of a subsidiary of Belgacom, Bics, which offers telecom services in Africa and in the Middle East.16 Newspaper Der Spiegel referred to documents leaked by Snowden indicating the involvement of the British GCHQ intelligency agency behind the hack.17 The Belgian federal public prosecutors referred to the incident as «state-sponsored cyber-espionage’18, while the Belgian Prime Minister, Elio di Rupo, categorized it as «strategic information gathering» with «a high-level involvement by another country».19 Elio Di Rupo also noted that «appropriate steps will be taken if the break-in turns out to be a case of cyber-espionage».20 In addition to the hacking of Belgacom, news headlines also focussed on the alleged hacking of Elio di Rupo’s private e-mail account,21 the computer network of the Belgian diplomatic service22 and the computer of Belgian professor Jean-Jacques Quisquater, expert in cryptography.23 Furthermore, on 10 May 2014, the newspaper De Tijd reported the hacking by Russia of the computer network of the Belgian Ministry of Foreign Affairs, supposedly to get confidential files about the current crisis in Ukraine.24 On 12 May 2014, De Tijd reported about the decision of the Belgian Ministry of Foreign Affairs to go offline by putting its computer networks in quarantine.25
3.
Post-Snowden inquiries ^
Second, the same Belgian Privacy Commission initiated an investigation in the hacking of Belgacom and a co-investigation with the Dutch Data Protection Authority into the security of the financial system of the «Society for Worldwide Interbank Financial Telecommunication» (SWIFT), following allegations of access by foreign intelligence services to the financial data traffic of SWIFT.30
Third, the post-Snowden response of the Belgian public prosecutors has been quite strong. Pre-Snowden, in 2013, federal public prosecutor Frédéric Van Leeuw expressed his fear that a great disaster may be needed in order to convince the public of a general cyber security policy.31 The abovementioned victims of hacking, Belgacom, Prime Minister Elio di Rupo and the Belgian Ministry of Foreign Affairs filed complaints with the federal prosecutor. Additionally, public prosecutors are investigating the hacking of the computer network of the Belgian diplomatic service and of the computer of Professor Jean-Jacques Quisquater, expert in cryptography (see above: 1.).
4.1.
India ^
4.1.1.
National Cyber Security Policy 2013 and E-Mail Policy by the Department of Electronics and Information Technology ^
4.1.2.
E-Mail Policy of the Government of India ^
4.1.3.
Report on Cyber Crime, Cyber Security, and Right to Privacyby the Parliamentary Standing Committee on Information Technology ^
4.1.4.
Domestic Servers ^
4.2.
Belgium ^
5.1.
India ^
5.2.
Belgium ^
6.
Reflections and conclusions ^
This is unfortunate as, despite contextual differences, the two jurisdictions should be drawn together by the common goal of ensuring that the rights of citizens are upheld in the context of State surveillance – foreign and domestic. One way to achieve commonality would be to subscribe to the International Principles on the Application of Human Rights to Communications Surveillance. The Principles, developed in 2012–2013, seek to explain how international human rights law applies in the present digital and global environment, and define principles that State led surveillance regimes necessarily need to incorporate to ensure that practices are consistent with human rights.67
Gertjan Boulet is a PhD Candidate at the Vrije Universiteit Brussel (Brussels, Belgium).
Elonnai Hickok is Programme Manager (Internet Governance) at the Centre for Internet and Society (Bangalore, India).
- 1 For more information about the Snowden leaks see: Al Jazeera, «Gaurdian announces leak of classified NSA documents», 5 June 2013. Available at: http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html (all Internet sources last visited on 9 May 2014).
- 2 Indiaonlinepages.com. Available at: http://www.indiaonlinepages.com/population/india-current-population.html.
- 3 The Economist, «Less than allies, more than friends», 16 June 2012. Available at: http://www.economist.com/node/21556935.
- 4 Andrew North, «NSA leaks helping India become «Big Brother» state?», BBC, 31 October 2013. Available at: http://www.bbc.co.uk/news/world-asia-india-24753696.
- 5 Glenn Greenwald/Shobhan Saxena, «India among top targets of spying by NSA», The Hindu, 23 September 2013. Available at: http://www.thehindu.com/news/national/india-among-top-targets-of-spying-by-nsa/article5157526.ece.
- 6 Shobhan Saxena, «NSA planted bugs at Indian mission in D.C, U.N.», The Hindu, 25 September 2013. Available at: http://www.thehindu.com/news/international/world/nsa-planted-bugs-at-indian-missions-in-dc-un/article5164944.ece.
- 7 BBC, «India plans to restrict E-Mail use after NSA leaks», 30 October 2013. Available at: http://www.bbc.com/news/technology-24744695.
- 8 Andrew North, «NSA leaks helping India become «Big Brother» state?», BBC, October 31st 2013. Available at: http://www.bbc.co.uk/news/world-asia-india-24753696.
- 9 Jason Burke, «NSA spied on Indian embassy and UN mission, Edward Snowden files reveal», The Guardian, 25 September 2013. Available at: http://www.theguardian.com/world/2013/sep/25/nsa-surveillance-indian-embassy-un-mission.
- 10 M. Rochan, «Snowden NSA Leaks: India’s Election Commission Dumps Google», International Business Times, 10 January 2014. Available at: http://www.ibtimes.co.uk/snowden-nsa-leaks-indias-election-commission-dumps-google-1431822.
- 11 For access to the petition website see: https://www.change.org/en-IN/petitions/google-facebook-microsoft-yahoo-reveal-information-on-data-of-indian-citizens-given-to-us-security-agencies-2#.
- 12 Wasantha Rupasinghe, «New Delhi downplays evidence of extensive NSA spying targeting India,» WSWS, 14 November 2013. Available at: http://www.wsws.org/en/articles/2013/11/14/nsai-n14.html.
- 13 Sushil Aaron, «Waiting for Greenwald: why India cant» stay mute on NSA spying», Hindustan Times, 3 December 2013. Available at: http://www.hindustantimes.com/comment/analysis/waiting-for-greenwald-why-india-can-t-stay-mute-on-nsa-spying/article1-1158485.aspx.
- 14 Andrew North, «NSA leaks helping India become «Big Brother» state?», BBC, 31 October 2013. Available at: http://www.bbc.co.uk/news/world-asia-india-24753696.
- 15 Andrew Rettman, «Hackers stole Van Rompuy’s E-Mails», EU Observer, 30 July 2012. Available at: http://euobserver.com/justice/117097.
- 16 Mark Eeckhaut/Peter De Lobel/Nikolas Vanhecke, «NSA verdacht van hacken Belgacom» (NSA suspected of the hacking of Belgacom), De Standaard, 19 September 2013. Available at: http://www.standaard.be/cnt/dmf20130915_00743233.
- 17 Spiegel, «Belgacom Attack: Britain’s GCHQ Hacked Belgian Telecoms Firm», 20 September 2013. Available at: http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html.
- 18 Colin Clapson, «Who bugged Belgacom», Flandersnews.be, 16 September 2013. Available at: http://www.deredactie.be/cm/vrtnieuws.english/News/1.1730665.
- 19 New Europe «Belgium’s telecoms firm Belgacom hacked; officials suspect state-sponsored cyber-espionage», 16 September 2013. Available at: http://www.neurope.eu/news/wire/belgiums-telecoms-firm-belgacom-hacked-officials-suspect-state-sponsored-cyber-espionage.
- 20 Alan Hope, «Belgacom computers hacked», Flanders Today, 18 September 2013. Available at: http://www.flanderstoday.eu/business/belgacom-computers-hacked.
- 21 FlandersNews.be, « PM’s personal E-Mail box hacked», 31 May 2013. Available at: http://www.deredactie.be/cm/vrtnieuws.english/Politics/1.1644174.
- 22 Simon Demeulemeester, «Parket onderzoekt hacking «gevoelige informatie» Buitenlandse Zaken» (Public Prosecutor investigates hacking of «sensitive information» Foreign Affairs), Knack.be, 19 September 2013. Available at:http://www.knack.be/nieuws/belgie/parket-onderzoekt-hacking-gevoelige-informatie-buitenlandse-zaken/article-normal-106557.html.
- 23 Mark Eeckhaut/Nikolas Vanhecke, «Belgian professor in cryptography hacked» (English summary), De Standaard, 1 February 2014. Available at: http://www.standaard.be/cnt/dmf20140201_011.
- 24 Lars Bové, «Moskou hackt Belgische staat. Spionage in volle Oekraïne-crisis» (Moscow hacks the Belgian state. Espionage in full-blown Ukraine crisis), De Tijd, 10 May 2014. Available at: http://www.tijd.be/nieuws/politiek_economie_belgie/Moskou_hackt_Belgische_staat.9499843-3136.art?ckc=1.
- 25 Lars Bové, «Diplomatie offlina na hacking» (Diplomatic service offline after hacking), De Tijd, 12 May 2014. Available at: http://www.tijd.be/nieuws/politiek_economie_belgie/Diplomatie_offline_na_hacking.9500343-3136.art.
- 26 Liga voor Mensenrechten, «Liga vraagt Parlementaire Onderzoekscommissie over NSA» (Liga asks for Parliamentary Inquiry Commission on the NSA), 24 January 2014. Available at: http://www.mensenrechten.be/index.php/site/nieuwsberichten/liga_vraagt_parlementaire_onderzoekscommissie_over_nsa.
- 27 Jos De Greef, «Groenen willen onderzoekscommissie naar spionage» (The Greens ask an inquiry commission for espionage), Flandersnews.be, 1 February 2014, http://www.deredactie.be/cm/vrtnieuws/buitenland/NSA-schandaal/140201_NSA_groenen.
- 28 Colin Clapson, «Did Belgium know about US snooping?», Flandersnews.be, 2 July 2013. Available at: http://www.deredactie.be/cm/vrtnieuws.english/News/1.1667342.
- 29 Kristof Clerix, «Controlecomité inlichtingendiensten start groot Prism-onderzoek» (Control committee for intelligence services starts a big Prism-investigation», Mondiaal Nieuws, 5 August 2013. Available at: http://www.mo.be/artikel/controlecomite-inlichtingendiensten-start-groot-prism-onderzoek.
- 30 Caroline Wilson, «Belgian and Dutch DPAs to investigate security of SWIFT system», blog of Privacy International, 15 November 2013. Available at: https://www.privacyinternational.org/blog/belgian-and-dutch-dpas-to-investigate-security-of-swift-system.
- 31 Interview by Nikolas Vanhecke with Frédéric Van Leeuw, De Standaard, 5 April 2013. Available at: http://www.standaard.be/cnt/dmf20130404_00529905.
- 32 The Department of Electronics and Information Technology is responsible for the creation and implementation of policies related to the internet and information technology – including cyber laws and cyber security. More information about the Department can be found at: http://deity.gov.in/content/functions-deit.
- 33 Department of Electronics and Information Technology, National Cyber Security Policy 2013. July 2013. Available at: http://deity.gov.in/sites/upload_files/dit/files/National%20Cyber%20Security%20Policy%20(1).pdf.
- 34 Notification from the Department of Information Technology Government of Himachal Pradesh, to all the Administrative Secretaries to the Government of Himachal Pradesh. Consideration of «E-Mail policy of GoI and Policy on acceptable use of IT Resources of GiO, formulated by DeitY, by the Committee of Secretaries. Available at: http://himachaldit.gov.in/file.axd?file=2013%2F11%2FGoI+Mail+policy.pdf.
- 35 For access to the policies comprising the «E-Mail Policy» see: http://deity.gov.in/content/E-Mail-policy.
- 36 New Delhi Television (NDTV), Indian Government wakes up to risk of Hotmail, Gmail, 8 December 2013. Available at: http://www.ndtv.com/article/india/indian-government-wakes-up-to-risk-of-hotmail-gmail-455999.
- 37 Standing Committee on Information Technology, «The 52nd Report on Cyber Crime, Cyber Security, and Right to Privacy», February 2014 p. 14. Available at: http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf.
- 38 Ibid., p. 21.
- 39 Ibid., p. 70.
- 40 The Department of Telecommunications is responsible for policies relating to the telecom sector, licensing of telecommunication companies, and coordination of matters relating to telecommunications. More information about the Department can be found at: http://www.dot.gov.in/about-us/objectives-dot.
- 41 Thomas K. Thomas, «Route domestic Net traffic via India servers, NSA tells operators», The Hindu Business Line, 14 August 2013. Available at: http://www.thehindubusinessline.com/industry-and-economy/info-tech/route-domestic-net-traffic-via-india-servers-nsa-tells-operators/article5022791.ece.
- 42 Hindustantimes, «US Fallout: Indian ISPs seek local servers for global firms», 10 June 2013. Available at: http://www.hindustantimes.com/business-news/us-fallout-indian-isps-seek-local-servers-for-global-firms/article1-1073789.aspx.
- 43 Belgian Standing Intelligence Agencies Review Committee, «Conclusions and recommendations of the investigation into the way in which the Belgian intelligence services consider the necessity of protecting the information systems against foreign interceptions and cyberattacks», Enquête de contrôle 2007.181. The French version is available at: http://www.comiteri.be/images/pdf/eigen_publicaties/rapport_181_%20fr.pdf.
- 44 Cyber Security Strategy, 21 November 2012, p. 1. The Dutch version is available at: https://www.b-ccentre.be/wp-content/uploads/2013/03/cybersecustra_nl.pdf. The French version is available at: https://www.b-ccentre.be/wp-content/uploads/2013/03/cybersecustra_fr.pdf.
- 45 For an overview of national cybersecurity policies and strategies, see NATO Cooperative Cyber Defence Centre of Excellence. Available at: http://ccdcoe.org/328.html.
- 46 Cyber Security Strategy, 21 November 2012, p. 9.
- 47 Telecompaper, « Belgium reserves EUR 10 mln in 2014 budget for cybersecurity», 10 October 2013. Available at: http://www.telecompaper.com/news/belgium-reserves-eur-10-mln-in-2014-budget-for-cybersecurity--972139.
- 48 Lars Bové, «Di Rupo vergeet miljoenen voor cyberbeveiliging» (Di Rupo forgets millions for cybersecurity), De Tijd, 8 May 2014. Available at: http://www.tijd.be/nieuws/politiek_economie_belgie/Di_Rupo_vergeet_miljoenen_voor_cyberbeveiliging.9498802-3136.art?ckc=1.
- 49 International Chamber of Commerce (ICC) Belgium, FEB, EY, Microsoft, L-SEC, B-CCENTRE & ISASA Belgium, Belgian cyber security guide. Protect your information, November 2013. Available at: http://www.iccbelgium.be/images/uploadedfiles/BCSG.pdf.
- 50 MB, «A cyber security centre for Belgium», Flandersnews.be, 20 December 2013. Available at: http://www.deredactie.be/cm/vrtnieuws.english/News/1.1810978.
- 51 Ibid.
- 52 Gertjan Boulet/Koen Gorissen, «De bescherming van persoonsgegevens in de cloud» (the protection of personal data in the cloud), in Handboek informatiemanagement (Manual on Information management), 2013, issue 6, Politeia, pp. 30–31.
- 53 Andrew North, «NSA Leaks helping India become «Big Brother» State», BBC, 31 October 2013. Available at: http://www.bbc.com/news/world-asia-india-24753696.
- 54 Press Information Bureau, «Government of India. Centralised System to Monitor Communications. Ministry of Communications and Information Technology», 26 November 2009. Available at: http://pib.nic.in/newsite/erelease.aspx?relid=54679.
- 55 Department of Telecommunications, «Amendment to the UAS License agreement regarding Central Monitoring System», 11 October 2013. Available at: http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf.
- 56 Kalyan Parbat, «Prepare yourself to be snooped in the interest of national security», 17 December 2013. Available at: http://articles.economictimes.indiatimes.com/2013-12-27/news/45626736_1_indian-telegraph-act-national-security-telecom-department.
- 57 Sandeep Joshi, «India gets ready to roll out cyber snooping agency», The Hindu, 10 June 2013. Available at: http://www.thehindu.com/news/national/india-gets-ready-to-roll-out-cyber-snooping-agency/articl98049.ece.
- 58 Gulveen Aulakh, «Government plans to access your mobile data», Times of India, 3 March 2014. Available at: http://timesofindia.indiatimes.com/tech/tech-news/telecom/Government-plans-to-access-your-mobile-data/articleshow/31323329.cms.
- 59 Wet van 30 juli 2013 houdende wijziging van de artikelen 2, 126 en 145 van de wet van 13 juni 2005 betreffende de elektronische communicatie en van artikel 90decies van het Wetboek van strafvordering (Law of 30 July 2013 amending Articles 2, 126 and 145 of the Law of 13 June 2005 on electronic communications), Belgian Official Journal 23 August 2013. The Dutch version of the law is available at: http://www.bipt.be/public/files/nl/21054/2013_07_30_Loi%20modifiant%20LCE.pdf. The French version of the law is available at: http://www.bipt.be/public/files/fr/21054/2013_07_30_Loi%20modifiant%20LCE.pdf.
- 60 Koninklijk besluit van 19 september 2013 tot uitvoering van artikel 126 van de wet van 13 juni 2005 betreffende de elektronische communicatie (Royal Decree of 19 September 2013 executing Article 126 of the Law of 13 June 2005 on electronic communications), Belgian Official Journal 8 October 2013. The Dutch version of the Royal Decree is available at: http://www.bipt.be/public/files/nl/21058/2013_09_19_Art%20126%20LCE.pdf. The French verson of the Royal Decree is available at: http://www.bipt.be/public/files/fr/21058/2013_09_19_Art%20126%20LCE.pdf.
- 61 European Parliament and Council of the European Union (2006), Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC, OJ L 105, 13 April 2006.
- 62 DataGuidance, «Belgium: Decree fully transposes Data Retention Directive», 31 October 2013. Available at: http://www.dataguidance.com/dataguidance_privacy_this_week.asp?id=2128 ; For an overview of the new Belgian Law, see Jan Dhont/David Dumont, «Belgium Introduces Broad Data Retention Obligations». Available at: http://www.lorenz-law.com/wp-content/uploads/Belgium-Introduces-Broad-Data-Retention-Obligations.pdf.
- 63 European Court of Justice (Grand Chamber), Digital Rights Ireland and Seitlinger and Others, Joined Cases C-293/12 and C-594/12, 8 April 2014. The press release is available here: http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf.
- 64 Heini Järvinen, «Belgian NGO’s challenging the data retention law», EDRi 12 March 2014. Available at: http://edri.org/belgian-ngos-challenging-data-retention-law/.
- 65 Belgian Privacy Commission, «Adviesaanvraag inzake het voorontwerp van wet en het ontwerp van koninklijk besluit inzake dataretentie, en het ontwerp van koninklijk besluit inzake de medewerkingsplicht (A/09/012)» (Request for advice concerning the proposals for a Law and Royal Decree on data retention, and concerning the proposal for a Royal Decree on the duty to cooperate), Advice nr 20/2009 of 1 July 2009. Available at: http://www.privacycommission.be/sites/privacycommission/files/documents/advies_20_2009_1.pdf.
- 66 Jan Dhont/David Dumont, «New Belgian Royal Decree Introducing Broad Data Retention Obligations», interview with Nymity, January 2014, p. 2. Available at: http://www.nymity.com/~/media/Nymity/Files/Interviews/2014/2014-01-dhontdumont.aspx%E2%80%9D.
- 67 The Principles are: Legality, Legitimate Aim, Necessity, Adequacy, Proportionality, Competent Judicial Authority, Due Process, User Notification, Transparency, Public Oversight, Integrity of Communications and Systems, Safeguards for International Cooperation, and Safeguards against illegitimate access. The principles can be accessed at: https://en.necessaryandproportionate.org/text.