Next page

How a Dutch law affects the global internet traffic

Where is Edward Snowden when you need him? In a small country by the sea, some disturbing legislation is underway that has consequences for internet users around the world.

With this new bill, the Dutch Intelligence and Security Service (AIVD and DISS) would be empowered to investigate cable-bound telecommunication. The new proposed Dutch legislation is a modernization of a 2002 law on Intelligence and Security, which allows mobile communication to be captured. The new law would expand the reach of the intelligence services to fixed lines and cables, including optical fiber. The legislation is sold to the public from an anti-terror perspective. And the Dutch government believes that the protection of the high tech industry, vital sectors and the government need to be protected by a modernization of the law. If passed by Dutch parliament, we could see this legislation go into effect as early as 2017/2018.

The proposed law would rule that AIVD and DISS would have to cooperate with intelligence services of other countries. The timely sharing of information is critical to intelligence and security services; and in the eyes of the Dutch Government, the ‘need to share’ principle must apply to prevent terrorist attacks, and protect military operations with allies. Granting the permission to share these ‘large data sets’  would be in the hands of the minister, and if you want smaller data sets the Dutch services would be free to give them out within certain limits.

The Netherlands is such a tiny country, so why could this legislation be important for global internet users? That has to do with AMS-IX, one of the the largest internet exchanges in the world. Immense volumes of data from all over the globe run across the AMS-IX hub. Under the new law, intelligence services are allowed to monitor the traffic for surveillance and detection purposes. The deployment of powers under the law is said to be object-targeted. But you do not have to have much imagination to understand that in order to find object-related communications, a data-lake of all sorts of communication needs to be created  – including that of innocent people.

We find this legislation to be a disturbing development. The need-to-share principle paves the way for foreign security services to tap into the AMS-IX equipment by proxy.

One thing is certain, the law will boost the wider use of end-to-end encryption.

Would you like to know if your network could be protected from snooping eyes? Contact us at

Next page
Latest articles
Telecom IoT Investments Are Short Sighted'
26 May 2017

This week U.S. telecom giant AT&T announced it’s rolling out their LTE Cat-M1 network for network enterprise IoT and smart city implementation. Verizon beat them to market last year with the same technology. But while this has the potential to connect millions

Further reading »
Readtime: 5 minutes
WannaCry Is Just The Beginning'
19 May 2017

The effects of last weeks ransomware attack are still lingering. The world-wide attack reportedly hit 300,000 pc’s, telecoms, major companies, governments and even hospitals. Some people and organizations have paid up, while others are refusing to pay and losing their

Further reading »
Readtime: 3 minutes
The 3 biggest challenges facing the cloud'
11 May 2017

Everyone is heading to the cloud because, essentially, it makes business easier. Cloud services let companies ramp up capacity as they need it, run high-powered applications and expand and contract IT resources as they need them — whether it’s with

Further reading »
Readtime: 5 min
All Articles