D A TA F L O W S & N A T I O N A L S E C U R I T Y
A C O N C E P T U A L F R A M E W O R K T O A S S E S S
R E S T R I C T I O N S O N D A TA F L O W S
U N D E R G A T S S E C U R I T Y E X C E P T I O N
M A R T I N A F R A N C E S C A F E R R A C A N E
R E S E A R C H F E L L O W A T C A L I F O R N I A I N T E R N A T I O N A L L A W C E N T E R
L U N C H S E M I N A R
8 F E B R U A RY 2 0 1 8
O U T L I N E
1. B A C K G R O U N D I N F O
2. R E S T R I C T I O N S O N D A TA F L O W S
3. G A T S S E C U R I T Y E X C E P T I O N
4. D A TA F L O W S & N A T I O N A L S E C U R I T Y
• C Y B E R E S P I O N A G E
• C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E
• T E R R O R I S T T H R E A T S
5. C O N C L U S I O N S
1. B A C K G R O U N D I N F O
2. R E S T R I C T I O N S O N D A TA F L O W S
3. G A T S S E C U R I T Y E X C E P T I O N
4. D A TA F L O W S & N A T I O N A L S E C U R I T Y
• C Y B E R E S P I O N A G E
• C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E
• T E R R O R I S T T H R E A T S
5. C O N C L U S I O N S
O U T L I N E
- WTO: World Trade Organisation
- 95% world trade
- GATS: General Agreement on Trade in Services
- Exceptions: data privacy, national security, etc.
- Dispute Settlement Understanding
B A C K G R O U N D I N F O
Restrictions on data flows: do they constitute a
restriction on trade in services?
Yes
No
B A C K G R O U N D I N F O
—> Need for new language
—> GATS applies
What if a country challenged a measure restricting
data flows under the WTO?
1. B A C K G R O U N D I N F O
2. R E S T R I C T I O N S O N D A TA F L O W S
3. G A T S S E C U R I T Y E X C E P T I O N
4. D A TA F L O W S & N A T I O N A L S E C U R I T Y
• C Y B E R E S P I O N A G E
• C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E
• T E R R O R I S T T H R E A T S
5. C O N C L U S I O N S
O U T L I N E
R E S T R I C T I O N S O N D A TA F L O W S
Source: Ferracane (2017)
Source: Digital Trade Estimates Database - ECIPE
R E S T R I C T I O N S O N D A TA F L O W S
1. B A C K G R O U N D I N F O
2. R E S T R I C T I O N S O N D A TA F L O W S
3. G A T S S E C U R I T Y E X C E P T I O N
4. D A TA F L O W S & N A T I O N A L S E C U R I T Y
• C Y B E R E S P I O N A G E
• C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E
• T E R R O R I S T T H R E A T S
5. C O N C L U S I O N S
O U T L I N E
G A T S A R T. X I V b i s
1. Nothing in this Agreement shall be construed:
(a) to require any Member to furnish any information, the disclosure of which it considers
contrary to its essential security interests; or
(b) to prevent any Member from taking any action which it considers necessary for
the protection of its essential security interests:
(i) relating to the supply of services as carried out directly or indirectly for the
purpose of provisioning a military establishment;
(ii) relating to fissionable and fusionable materials or the materials from which
they are derived;
(iii) taken in time of war or other emergency in international relations; or
(c) to prevent any Member from taking any action in pursuance of its obligations under
the United Nations Charter for the maintenance of international peace and security.
(…)
O U T L I N E
1. B A C K G R O U N D I N F O
2. R E S T R I C T I O N S O N D A TA F L O W S
3. G A T S N A T I O N A L S E C U R I T Y E X C E P T I O N
4. D A TA F L O W S & N A T I O N A L S E C U R I T Y
• C Y B E R E S P I O N A G E
• C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E
• T E R R O R I S T A T TA C K
5. C O N C L U S I O N S
C Y B E R E S P I O N A G E
Source: https://goo.gl/images/5Pa7Pq
Source: http://resources.infosecinstitute.com/recognize-phishing-emails/#gref
C Y B E R E S P I O N A G E
- Legal analysis:
- International Customary Law (Tallinn Manual 2.0)
- National Laws (in particular, US law —> FISA, Executive Order
12,333 of 1981, but also PRISM and downstream collection)
- In summary, data not might be legally better protected when it is
stored locally in the country of origin
- Technical analysis:
- Harder to access data in certain cases but other forms of access
remain available (phishing, hardware back-doors, etc)
O U T L I N E
1. B A C K G R O U N D I N F O
2. R E S T R I C T I O N S O N D A TA F L O W S
3. G A T S S E C U R I T Y E X C E P T I O N
4. D A TA F L O W S & N A T I O N A L S E C U R I T Y
• C Y B E R E S P I O N A G E
• C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E
• T E R R O R I S T T H R E A T S
5. C O N C L U S I O N S
C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E
1. Definition of critical infrastructure
2. Legally: no difference
3. Technically: certain attacks can become more costly
4. Risk of attack might also increase
O U T L I N E
1. B A C K G R O U N D I N F O
2. R E S T R I C T I O N S O N D A TA F L O W S
3. G A T S S E C U R I T Y E X C E P T I O N
4. D A TA F L O W S & N A T I O N A L S E C U R I T Y
• C Y B E R E S P I O N A G E
• C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E
• T E R R O R I S T T H R E A T S
5. C O N C L U S I O N S
T E R R O R I S T T H R E A T S
- Frustrating delay of MLATs
- Copy of data would be enough
- Only threats within the country
- Privacy vs Security
O U T L I N E
1. B A C K G R O U N D I N F O
2. R E S T R I C T I O N S O N D A TA F L O W S
3. G A T S S E C U R I T Y E X C E P T I O N
4. D A TA F L O W S & N A T I O N A L S E C U R I T Y
• C Y B E R E S P I O N A G E
• C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E
• T E R R O R I S T T H R E A T S
5. C O N C L U S I O N S
C O N C L U S I O N S
- Case-by-case basis
- Scope of the measure (sector, type of data, etc)
- Threat picture of the country
- Alternative technological solutions
M A R T I N A F R A N C E S C A F E R R A C A N E
E M A I L : M A R T I N A . F E R R A C A N E @ G M A I L . C O M
THANK YOU!

DATA FLOWS & NATIONAL SECURITY

  • 1.
    D A TAF L O W S & N A T I O N A L S E C U R I T Y A C O N C E P T U A L F R A M E W O R K T O A S S E S S R E S T R I C T I O N S O N D A TA F L O W S U N D E R G A T S S E C U R I T Y E X C E P T I O N M A R T I N A F R A N C E S C A F E R R A C A N E R E S E A R C H F E L L O W A T C A L I F O R N I A I N T E R N A T I O N A L L A W C E N T E R L U N C H S E M I N A R 8 F E B R U A RY 2 0 1 8
  • 2.
    O U TL I N E 1. B A C K G R O U N D I N F O 2. R E S T R I C T I O N S O N D A TA F L O W S 3. G A T S S E C U R I T Y E X C E P T I O N 4. D A TA F L O W S & N A T I O N A L S E C U R I T Y • C Y B E R E S P I O N A G E • C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E • T E R R O R I S T T H R E A T S 5. C O N C L U S I O N S
  • 3.
    1. B AC K G R O U N D I N F O 2. R E S T R I C T I O N S O N D A TA F L O W S 3. G A T S S E C U R I T Y E X C E P T I O N 4. D A TA F L O W S & N A T I O N A L S E C U R I T Y • C Y B E R E S P I O N A G E • C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E • T E R R O R I S T T H R E A T S 5. C O N C L U S I O N S O U T L I N E
  • 4.
    - WTO: WorldTrade Organisation - 95% world trade - GATS: General Agreement on Trade in Services - Exceptions: data privacy, national security, etc. - Dispute Settlement Understanding B A C K G R O U N D I N F O
  • 5.
    Restrictions on dataflows: do they constitute a restriction on trade in services? Yes No B A C K G R O U N D I N F O —> Need for new language —> GATS applies What if a country challenged a measure restricting data flows under the WTO?
  • 6.
    1. B AC K G R O U N D I N F O 2. R E S T R I C T I O N S O N D A TA F L O W S 3. G A T S S E C U R I T Y E X C E P T I O N 4. D A TA F L O W S & N A T I O N A L S E C U R I T Y • C Y B E R E S P I O N A G E • C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E • T E R R O R I S T T H R E A T S 5. C O N C L U S I O N S O U T L I N E
  • 7.
    R E ST R I C T I O N S O N D A TA F L O W S Source: Ferracane (2017)
  • 8.
    Source: Digital TradeEstimates Database - ECIPE R E S T R I C T I O N S O N D A TA F L O W S
  • 9.
    1. B AC K G R O U N D I N F O 2. R E S T R I C T I O N S O N D A TA F L O W S 3. G A T S S E C U R I T Y E X C E P T I O N 4. D A TA F L O W S & N A T I O N A L S E C U R I T Y • C Y B E R E S P I O N A G E • C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E • T E R R O R I S T T H R E A T S 5. C O N C L U S I O N S O U T L I N E
  • 10.
    G A TS A R T. X I V b i s 1. Nothing in this Agreement shall be construed: (a) to require any Member to furnish any information, the disclosure of which it considers contrary to its essential security interests; or (b) to prevent any Member from taking any action which it considers necessary for the protection of its essential security interests: (i) relating to the supply of services as carried out directly or indirectly for the purpose of provisioning a military establishment; (ii) relating to fissionable and fusionable materials or the materials from which they are derived; (iii) taken in time of war or other emergency in international relations; or (c) to prevent any Member from taking any action in pursuance of its obligations under the United Nations Charter for the maintenance of international peace and security. (…)
  • 11.
    O U TL I N E 1. B A C K G R O U N D I N F O 2. R E S T R I C T I O N S O N D A TA F L O W S 3. G A T S N A T I O N A L S E C U R I T Y E X C E P T I O N 4. D A TA F L O W S & N A T I O N A L S E C U R I T Y • C Y B E R E S P I O N A G E • C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E • T E R R O R I S T A T TA C K 5. C O N C L U S I O N S
  • 12.
    C Y BE R E S P I O N A G E Source: https://goo.gl/images/5Pa7Pq
  • 13.
  • 15.
    C Y BE R E S P I O N A G E - Legal analysis: - International Customary Law (Tallinn Manual 2.0) - National Laws (in particular, US law —> FISA, Executive Order 12,333 of 1981, but also PRISM and downstream collection) - In summary, data not might be legally better protected when it is stored locally in the country of origin - Technical analysis: - Harder to access data in certain cases but other forms of access remain available (phishing, hardware back-doors, etc)
  • 16.
    O U TL I N E 1. B A C K G R O U N D I N F O 2. R E S T R I C T I O N S O N D A TA F L O W S 3. G A T S S E C U R I T Y E X C E P T I O N 4. D A TA F L O W S & N A T I O N A L S E C U R I T Y • C Y B E R E S P I O N A G E • C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E • T E R R O R I S T T H R E A T S 5. C O N C L U S I O N S
  • 17.
    C Y BE R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E 1. Definition of critical infrastructure 2. Legally: no difference 3. Technically: certain attacks can become more costly 4. Risk of attack might also increase
  • 18.
    O U TL I N E 1. B A C K G R O U N D I N F O 2. R E S T R I C T I O N S O N D A TA F L O W S 3. G A T S S E C U R I T Y E X C E P T I O N 4. D A TA F L O W S & N A T I O N A L S E C U R I T Y • C Y B E R E S P I O N A G E • C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E • T E R R O R I S T T H R E A T S 5. C O N C L U S I O N S
  • 19.
    T E RR O R I S T T H R E A T S - Frustrating delay of MLATs - Copy of data would be enough - Only threats within the country - Privacy vs Security
  • 20.
    O U TL I N E 1. B A C K G R O U N D I N F O 2. R E S T R I C T I O N S O N D A TA F L O W S 3. G A T S S E C U R I T Y E X C E P T I O N 4. D A TA F L O W S & N A T I O N A L S E C U R I T Y • C Y B E R E S P I O N A G E • C Y B E R A T TA C K O N C R I T I C A L I N F R A S T R U C T U R E • T E R R O R I S T T H R E A T S 5. C O N C L U S I O N S
  • 21.
    C O NC L U S I O N S - Case-by-case basis - Scope of the measure (sector, type of data, etc) - Threat picture of the country - Alternative technological solutions
  • 22.
    M A RT I N A F R A N C E S C A F E R R A C A N E E M A I L : M A R T I N A . F E R R A C A N E @ G M A I L . C O M THANK YOU!