Take-Aways (AI)
  • The sto­rage and dis­clo­sure of traf­fic and con­nec­tion data by pro­vi­ders is based on clear legal foun­da­ti­ons (FADP, TCA, FADP) and is sub­ject to judi­cial authorization.
  • Tech­ni­cal and orga­nizatio­nal secu­ri­ty obli­ga­ti­ons should pre­vent unaut­ho­ri­zed access; data for­war­ding to aut­ho­ri­ties only for appro­ved appli­ca­ti­ons and limi­t­ed to mar­gi­nal data.

Que­sti­on Hess (03.1069): E‑Post monitoring
Done

Sub­mit­ted text

As a result of the Ordi­nan­ce on the Inter­cep­ti­on of Postal and Tele­com­mu­ni­ca­ti­ons Traf­fic of Octo­ber 31, 2001, all tele­com­mu­ni­ca­ti­ons ser­vice pro­vi­ders, inclu­ding Inter­net ser­vice pro­vi­ders, will be forced to store all con­nec­tion data for at least six months as of Janu­ary 1, 2003.

In this con­text, the fol­lo­wing que­sti­ons sug­gest themselves:

1. on the basis of which legal basis may pri­va­te-law orga­nizati­ons (Inter­net pro­vi­ders, etc.) retain digi­tal data of their cus­to­mers at all?

2) Does­n’t the sto­rage of all e‑mail and Inter­net data pro­vi­de an opti­mal plat­form for modern indu­stri­al espio­na­ge, in that stored data­ba­ses and data volu­mes of this magnitu­de vir­tual­ly encou­ra­ge the pre-sel­ec­tion of tar­gets or the eva­lua­ti­on of eco­no­mic rela­ti­on­ship networks?

3. how will it be ensu­red that only aut­ho­ri­zed per­sons have access to this digi­tal data?

4. is the Fede­ral Coun­cil awa­re that a majo­ri­ty of pri­va­te and com­mer­cial inter­net users can­not crea­te their own encryp­ti­on pro­grams, but rely on purchasable pro­grams that lack secu­ri­ty against pro­fes­sio­nal espionage?

5) Does the govern­ment know that in the case of encryp­ti­on in US pro­grams, the rele­vant codes are known to the US aut­ho­ri­ties, or does the Fede­ral Coun­cil con­sider encryp­ti­on to be an abso­lu­te means of pro­tec­ting data?

6. the­se mea­su­res are direc­ted in par­ti­cu­lar against orga­ni­zed crime and ter­ro­rist acti­vi­ties. In other words, against pro­fes­sio­nals! But how does the Fede­ral Coun­cil want to pre­vent that also bla­me­l­ess per­sons are not unneces­s­a­ri­ly invol­ved in inve­sti­ga­ti­ons during eva­lua­tions of the poli­ce, espe­ci­al­ly when real addres­ses of bla­me­l­ess citi­zens are used as cover addresses?

7. how high are the costs of this mea­su­re? Won’t the pro­vi­ders sim­ply pre­sent the bill for this moni­to­ring to the user in the end?

8. does the basic atti­tu­de of this sur­veil­lan­ce mea­su­re not testi­fy to the fact that anyo­ne could be a cri­mi­nal and the­r­e­fo­re must be moni­to­red per­ma­nent­ly as a precaution?

Respon­se of the Fede­ral Council

The obli­ga­ti­on of pro­vi­ders to make cer­tain data available to law enforce­ment aut­ho­ri­ties upon request ari­ses, on the one hand, from the Fede­ral Act on Data Pro­tec­tion (FADP; SR 235.1; Art. 13 para. 1 let. A) and, on the other hand, from the Fede­ral Act on the Sur­veil­lan­ce of Postal and Tele­com­mu­ni­ca­ti­ons Traf­fic of 6 Octo­ber 2000 (BÜPF; SR 780.1; Art. 15 para. 3). In con­trast, the asso­cia­ted Ordi­nan­ce on the Sur­veil­lan­ce of Postal and Tele­com­mu­ni­ca­ti­ons Traf­fic of 31 Octo­ber 2001 (VÜPF; SR 780.11) only con­ta­ins the cor­re­spon­ding imple­men­ting pro­vi­si­ons. The obli­ga­ti­on to keep cer­tain data available applies to all pro­vi­ders, i.e. both tele­com­mu­ni­ca­ti­ons pro­vi­ders (TSP) and Inter­net ser­vice pro­vi­ders (ISP).

Basi­cal­ly, a distinc­tion must be made bet­ween the data that the pro­vi­ders store and the data that the pro­vi­ders trans­mit to the Ser­vice for Spe­cial Tasks (DBA) and that is tem­po­r­a­ri­ly stored the­re. Depen­ding on the area (TSP and ISP or DBA) under con­side­ra­ti­on, the scope, con­tent, inten­ded use and dura­ti­on of data sto­rage as well as the legal basis differ.

1 The aut­ho­rizati­on to store data is deri­ved from the Data Pro­tec­tion Act (Art. 4 FADP; SR 235.1), the Tele­com­mu­ni­ca­ti­ons Act (Art. 43 TCA; SR 784.10) and the Inter­cep­ti­on of Per­so­nal Data Act. Art. 4 of the Data Pro­tec­tion Act sta­tes that per­so­nal data may only be obtai­ned lawful­ly. The lawful­ness of the sto­rage of tele­com­mu­ni­ca­ti­ons traf­fic data results from Artic­le 43 TCA. This sta­tes that all data that is (neces­s­a­ri­ly) exch­an­ged during tele­com­mu­ni­ca­ti­ons com­mu­ni­ca­ti­on is sub­ject to tele­com­mu­ni­ca­ti­ons sec­re­cy. The excep­ti­on to this tele­com­mu­ni­ca­ti­ons sec­re­cy is enshri­ned in law in the BÜPF.

2. any sto­rage of data also crea­tes the pos­si­bi­li­ty of unaut­ho­ri­zed access to such data. It is the respon­si­bi­li­ty of the per­son who sets up and ope­ra­tes a data­ba­se to pre­vent unaut­ho­ri­zed access.

Tele­com­mu­ni­ca­ti­ons com­mu­ni­ca­ti­on is not pos­si­ble wit­hout set­ting up and ope­ra­ting data­ba­ses. Inso­far as data­ba­ses are (or have to be) set up, the pro­vi­ders are sub­ject to tele­com­mu­ni­ca­ti­ons sec­re­cy and are thus obli­ged to pro­tect their data against unaut­ho­ri­zed access. The DBA has set up a com­pre­hen­si­ve tech­ni­cal and orga­nizatio­nal secu­ri­ty con­cept for the data it recei­ves from the pro­vi­ders in indi­vi­du­al cases, which pre­vents unaut­ho­ri­zed access to the data.

It should be noted that the data under dis­cus­sion here (espe­ci­al­ly the so-cal­led edge data from com­mu­ni­ca­ti­ons traf­fic, i.e., who com­mu­ni­ca­ted when with whom and for how long) has only limi­t­ed value for indu­stri­al espionage.

3 As alre­a­dy men­tio­ned, it is the respon­si­bi­li­ty of the pro­vi­ders to pre­vent unaut­ho­ri­zed access to their data­ba­ses. An ope­ra­tio­nal and orga­nizatio­nal secu­ri­ty con­cept exists for tho­se data that the DBA recei­ves. For obvious rea­sons, it is not pos­si­ble to go into details. The cor­ner­s­to­nes of the con­cept are, on the one hand, the tech­ni­cal shiel­ding of the system (e.g. fire­wall) and, on the other hand, orga­nizatio­nal mea­su­res (e.g. user administration).

4 The Fede­ral Coun­cil is awa­re that Inter­net users do not gene­ral­ly crea­te and use their own encryp­ti­on pro­grams, but purcha­se them. Howe­ver, it is the respon­si­bi­li­ty of Inter­net users or par­ti­ci­pan­ts in e‑mail traf­fic eit­her to pro­vi­de high­ly sen­si­ti­ve data with their own keys or to use other com­mu­ni­ca­ti­on chan­nels for the trans­mis­si­on of data.

5. the­re is no abso­lu­te pro­tec­tion through encryp­ti­on; any encryp­ti­on can be decrypt­ed. The decisi­ve fac­tor for the qua­li­ty of the secu­ri­ty of a par­ti­cu­lar encryp­ti­on pro­gram is the amount of com­pu­ter time that has to be spent on decryp­ting it. Howe­ver, rese­arch has shown that often the cau­se of ina­de­qua­te encryp­ti­on is not its qua­li­ty, but the user’s incor­rect use of the tech­no­lo­gy. Moreo­ver, very often data is only sen­si­ti­ve for a cer­tain peri­od of time, i.e., after a cer­tain point in time it is deli­bera­te­ly made public by the data owner hims­elf or it has lost its signi­fi­can­ce. As a rule, the­r­e­fo­re, abso­lu­te pro­tec­tion against decryp­ti­on is not neces­sa­ry, but rela­ti­ve pro­tec­tion is sufficient.

6. inter­cep­ti­on of tele­com­mu­ni­ca­ti­ons always rela­tes to a spe­ci­fic per­son who is alre­a­dy an urgent suspect or to a spe­ci­fic con­nec­tion that can be assi­gned to a suspect. The tele­com­mu­ni­ca­ti­ons data of a bla­me­l­ess citi­zen are only recor­ded within the scope of inter­cep­ti­on of tele­com­mu­ni­ca­ti­ons traf­fic if he or she com­mu­ni­ca­tes with a suspect or uses his or her connection.

Howe­ver, the instru­ment of tele­com­mu­ni­ca­ti­ons sur­veil­lan­ce is only one tool that law enforce­ment aut­ho­ri­ties can use in the cour­se of their inve­sti­ga­ti­ons. During an inve­sti­ga­ti­on, it is rea­di­ly appa­rent who­se data from tele­com­mu­ni­ca­ti­ons traf­fic was coll­ec­ted only by chan­ce – becau­se he is a bla­me­l­ess citi­zen in cont­act with a suspect – and is not rele­vant to the cri­mi­nal pro­ce­e­dings. The pro­ce­s­sing of such data is pre­cis­e­ly regu­la­ted in the BÜPF. The same applies to cover addres­ses who­se func­tion is soo­ner or later reco­gnized in the cour­se of cri­mi­nal pro­se­cu­ti­on. In the case of the­se addres­ses, it is inci­den­tal­ly also in the inte­rest of the per­son who­se address is misu­s­ed that this misu­se is unco­ver­ed in the cour­se of cri­mi­nal proceedings.

7. the costs of the mea­su­res con­sist of the invest­ment and ope­ra­ting costs of the DBA and the pro­vi­ders. In accordance with the sta­tu­to­ry pro­vi­si­ons, the DBA – like any other admi­ni­stra­ti­ve unit – applies a fee tariff which must ensu­re that the DBA’s ope­ra­ti­ons cover its costs. The pro­vi­ders have to bear the invest­ment costs them­sel­ves and are to be ade­qua­te­ly com­pen­sa­ted for their ser­vice in each indi­vi­du­al case.

With regard to the invest­ment costs at the DTA, no distinc­tion can be made bet­ween the invest­ment costs for e‑mail moni­to­ring and the invest­ment costs for the other mea­su­res for moni­to­ring tele­com­mu­ni­ca­ti­ons traf­fic. The same hard­ware and soft­ware is used for all mea­su­res. Curr­ent­ly, the DBA is being reor­ga­ni­zed tech­ni­cal­ly and ope­ra­tio­nal­ly. The invest­ment costs for the new tech­no­lo­gy amount to appro­xi­m­ate­ly CHF 7 to 10 mil­li­on, spread over 5 years.

Based on the fee tariff, the DBA char­ges bet­ween 20 and 200 francs to cover the ope­ra­ting costs, depen­ding on the mea­su­re taken in the area of e‑mail moni­to­ring (cf. Fee and Com­pen­sa­ti­on Tariff, Annex to the VÜPF).

The pro­vi­ders’ invest­ment costs depend on the size or cus­to­mer base of the com­pa­ny and are esti­ma­ted to be around 80,000 to 100,000 francs per pro­vi­der. Com­pen­sa­ti­on for the indi­vi­du­al ser­vice is also based on the abo­ve-men­tio­ned tariff and ran­ges from 20 to 750 francs.

Whe­ther a pro­vi­der pas­ses on or can pass on costs that are not alre­a­dy cover­ed by the afo­re­men­tio­ned com­pen­sa­ti­on is likely to depend pri­ma­ri­ly on the mar­ket situation.

8 The obli­ga­ti­on to store mar­gi­nal data on e‑mail traf­fic ari­ses from Artic­le 15 (3) BÜPF and is an ana­log­ous regu­la­ti­on, as it also applies to pro­vi­ders of other tele­com­mu­ni­ca­ti­ons ser­vices (e.g. tele­pho­ny). Data from com­mu­ni­ca­ti­ons traf­fic is only for­ward­ed by pro­vi­ders to the DTA if the­re is a request from a law enforce­ment agen­cy that has been appro­ved by a judge. The­se requests rela­te to spe­ci­fic par­ti­ci­pan­ts in tele­com­mu­ni­ca­ti­ons traf­fic or to spe­ci­fic con­nec­tions and spe­ci­fic data from tele­com­mu­ni­ca­ti­ons traf­fic that are pre­cis­e­ly defi­ned by the legislator.

If this data – most of which is requi­red for bil­ling pur­po­ses – were only stored by the pro­vi­ders once a spe­ci­fic request has been made, the instru­ment of tele­com­mu­ni­ca­ti­ons sur­veil­lan­ce would be wort­hl­ess for the law enforce­ment aut­ho­ri­ties in many cases. The con­cern for data pro­tec­tion is taken into account by ensu­ring that data is only for­ward­ed to the law enforce­ment aut­ho­ri­ties if the afo­re­men­tio­ned aut­ho­rizati­on pro­ce­du­re has been car­ri­ed out and the for­war­ding is also limi­t­ed to six months retro­s­pec­tively. In addi­ti­on, the retroac­ti­ve trans­fer only applies to the so-cal­led mar­gi­nal data (time, dura­ti­on and par­ti­ci­pan­ts in the com­mu­ni­ca­ti­on), but not to e‑mail content.