Inter­pel­la­ti­on Mathys (02.3599): Sur­veil­lan­ce of postal and tele­com­mu­ni­ca­ti­ons traffic

Inter­pel­la­ti­on Mathys (02.3599): Sur­veil­lan­ce of postal and tele­com­mu­ni­ca­ti­ons traffic

Sub­mit­ted text

I would ask the Fede­ral Coun­cil to ans­wer the fol­lo­wing questions:

1. does it agree that the Ordi­nan­ce of 31 Octo­ber 2001 on the Sur­veil­lan­ce of Postal and Tele­com­mu­ni­ca­ti­ons Traf­fic (VÜPF) encou­ra­ges the under­mi­ning of data protection?

2. is it also of the opi­ni­on that it must obli­ge the Inter­net pro­vi­ders to store the con­nec­tion data regi­stered in accordance with the VÜPF on net­work-inde­pen­dent data carriers?

3. is he also of the opi­ni­on that this con­nec­tion data must not be stored in bulk, but must be stored indi­vi­du­al­ly for each Inter­net access on a dif­fe­rent net­work-inde­pen­dent data carrier?

Justi­fi­ca­ti­on

With the VÜPF, the Con­fe­de­ra­ti­on also defi­nes the various types of moni­to­ring. The “retro­s­pec­ti­ve sur­veil­lan­ce” defi­ned in Artic­le 2 let­ter d man­da­tes the pro­vi­ders of postal and tele­com­mu­ni­ca­ti­ons ser­vices to regi­ster and retain data for six months. Under Artic­le 24, the­se data for Inter­net pro­vi­ders are descri­bed in more detail. Thus, the ser­vice for moni­to­ring postal and tele­com­mu­ni­ca­ti­ons traf­fic can request pro­vi­ders to dis­c­lo­se all con­nec­tion data for the past six months. It can be assu­med that Inter­net pro­vi­ders store this data elec­tro­ni­cal­ly. It can also be assu­med that this data is not stored on net­work-inde­pen­dent data car­ri­ers. At the very least, howe­ver, neither the law nor the ordi­nan­ce sti­pu­la­te sto­rage on a net­work-inde­pen­dent data carrier.

In con­nec­tion with the repea­ted­ly lamen­ted secu­ri­ty gaps on the Inter­net, the que­sti­on ari­ses in this con­text as to whe­ther data pro­tec­tion is still gua­ran­teed as a result. Alt­hough Artic­le 9 regu­la­tes data secu­ri­ty for the moni­to­ring ser­vice its­elf and for the trans­mis­si­on of moni­to­ring data to the ser­vice, it does not regu­la­te data secu­ri­ty for regi­stra­ti­on and sto­rage by Inter­net pro­vi­ders. Thus, it seems pos­si­ble and likely that unaut­ho­ri­zed per­sons could “hack” their way into the cor­re­spon­ding con­nec­tion data.

The­se unaut­ho­ri­zed per­sons do not neces­s­a­ri­ly have to be young peo­p­le who com­mit ille­gal acts in search of exci­te­ment and con­fir­ma­ti­on. They can also be hackers in the ser­vices of com­pa­nies, intel­li­gence agen­ci­es or other orga­nizati­ons that have or can deve­lop a natu­ral inte­rest in such con­nec­tion data and want to deri­ve a pro­fi­le of pri­va­te and busi­ness tran­sac­tions from the data obtai­ned in this way. Not only can tar­gets for fur­ther attacks be pre­sel­ec­ted from data obtai­ned in this way, but enti­re rela­ti­on­ship net­works of a pri­va­te or busi­ness natu­re can also be recons­truc­ted. The data stores of pro­vi­ders must appear par­ti­cu­lar­ly attrac­ti­ve for such attacks becau­se the data is stored the­re in con­cen­tra­ted form.

State­ment of the Fede­ral Council

The Tele­com­mu­ni­ca­ti­ons Act (TCA; SR 784.10) per­mits the pro­ce­s­sing and sto­rage of cer­tain data from tele­com­mu­ni­ca­ti­ons traf­fic. Artic­le 60 of the Tele­com­mu­ni­ca­ti­ons Ser­vice Ordi­nan­ce (TSO; SR 784.101.1) regu­la­tes which data may be pro­ce­s­sed and under which con­di­ti­ons. In par­ti­cu­lar, this is data which is requi­red for the estab­lish­ment of the con­nec­tion, for the pro­vi­si­on of infor­ma­ti­on in accordance with the Fede­ral Act on the Sur­veil­lan­ce of Postal and Tele­com­mu­ni­ca­ti­ons Traf­fic (BÜPF; SR 780.1) and for the rece­ipt of the fee for the ser­vices of the TSP. In addi­ti­on, cer­tain rights of cus­to­mers to infor­ma­ti­on are pro­vi­ded for vis-à-vis the TSPs, and they can demand that the TSPs pro­vi­de infor­ma­ti­on on the name and address of the cal­ling line in the event of abu­si­ve­ly estab­lished connections.

Accor­din­gly, the TCA alre­a­dy obli­ges the TSP to record and store the so-cal­led traf­fic and bil­ling data of all sub­scri­bers. The BÜPF and the asso­cia­ted ordi­nan­ce (VÜPF; SR 780.11) only sti­pu­la­te that this data and data spe­ci­fi­ed in more detail in the afo­re­men­tio­ned law must be released to desi­gna­ted aut­ho­ri­ties upon request in cer­tain cases (cri­mi­nal proceedings).

Inci­den­tal­ly, the TSPs also need the­se data for the pur­po­ses men­tio­ned in Artic­le 60 FDV.

1 The UTPA does not encou­ra­ge the under­mi­ning of data pro­tec­tion for the rea­sons sta­ted abo­ve. Based on Artic­le 43 TCA, the TSPs are obli­ged to keep the data in que­sti­on con­fi­den­ti­al and may only release pre­cis­e­ly spe­ci­fi­ed data if the requi­re­ments of the TCA or the BÜPF and the VÜPF are met.

2 An obli­ga­ti­on on the part of Inter­net pro­vi­ders to store only the con­nec­tion data requi­red for pro­vi­ding infor­ma­ti­on to the aut­ho­ri­ties in cri­mi­nal pro­ce­e­dings on net­work-inde­pen­dent data car­ri­ers makes no sen­se. As explai­ned abo­ve, the TSPs basi­cal­ly store the data in que­sti­on of all cus­to­mers for their own pur­po­ses; it is not neces­s­a­ri­ly cer­tain at the time of sto­rage whe­ther they still have to be used for pro­vi­ding infor­ma­ti­on to the aut­ho­ri­ties in cri­mi­nal pro­ce­e­dings. An obli­ga­ti­on to store the con­nec­tion data on net­work-inde­pen­dent car­ri­ers is not fea­si­ble from the out­set for the simp­le rea­son that at the time the data is stored, it is still com­ple­te­ly open as to which sub­scri­ber may have to be pro­vi­ded with infor­ma­ti­on in the future. This leads to a dis­pro­por­tio­na­te effort and also does not gua­ran­tee abso­lu­te secu­ri­ty against unaut­ho­ri­zed access. On the con­tra­ry, the more data is recor­ded or stored, the more likely it is that data secu­ri­ty will be com­pro­mi­sed, regard­less of the sto­rage medium.

The legis­la­tor only requi­res the TSP to ensu­re data secu­ri­ty (Art. 43 et seq. TCA and Art. 64 FDV). The tech­ni­cal, admi­ni­stra­ti­ve and orga­nizatio­nal mea­su­res to be taken are left to the TSPs. Such a regu­la­ti­on makes sen­se becau­se it allo­ws the indi­vi­du­al TSPs to sel­ect the means which are appro­pria­te for their operation.

The solu­ti­on pro­po­sed by the inter­pel­lant of a rule on how to ensu­re safe­ty car­ri­es the risk of a solu­ti­on not adapt­ed to each indi­vi­du­al case.

Aut­ho­ri­ty

Area

Topics

Rela­ted articles

Sub­scri­be