back to article Europe rules against general passenger data slurp

The European Data Protection Supervisor has taken a view against Passenger Name Record transfers, which obliges airlines to hand over the personal data they hold on every passenger entering or leaving the European Union. This includes names, addresses, emails and other contact details which are handed over in the name of ( …

COMMENTS

This topic is closed for new posts.
  1. The Fuzzy Wotnot
    Pint

    Really?

    I've never understood this, if you're that determined to achieve your fundamentalist and nefarious goals, sorting out some fake ID is the first, maybe second after get a gun and some ammo, on your terrorism checklist!

    Now when is this data-sharing stupidity going to be stopped by our American cousins?

    1. John G Imrie

      Now when is this data-sharing stupidity going to be stopped by our American cousins?

      That's easy, when they have all our data.

    2. Anonymous Coward
      Happy

      Ref: when is this data-sharing stupidity going to be stopped by our American cousins?

      Well it work on 24, and in the Hollywood movies, so the politicians think it is true!

      (unfortunately a number of US and UK law enforcement types also believe this, and should know better!)

    3. Anonymous Coward
      Happy

      sorting out some fake ID

      Mark Thomas nailed this one in his program "Seriously Organised Criminal", the government seems to believe the bad guys can't lie if you make them fill in a form!

      In real life, you would want to use somebody who has a squeaky clean background, and use thier real identities (less chance of being caught with fakes).

      What the data slurps, and forms can't do, is mind read the terrorist bording the aircraft. El Al get around this by using trained humans in the departure areas to profile passengers.

      One can therefore assume that the officials are;

      A) Stupid

      B) Persuing another agenda and using this as an excuse

      C) All of the above

      1. Anonymous Coward
        Happy

        I'll just travel as a certain bint.

        Although, I'm a man.

        Oh, wait....

      2. Anonymous Coward
        Thumb Up

        Upvote for thebox.bz MT lead!!!

        Thanks for the Mark Thomas lead. Yeah anything is possible, you just need the money (piss off if you think this world ain't run on money). A boat to $euorope_mainland (from uk), blimey life is looking up!

        Etc......... WIN!

      3. This post has been deleted by its author

  2. Stratman
    WTF?

    title

    Maybe I'm missing something, but what the hell has it got to do with th USA if I fly from London to Edinburgh?

    1. Anonymous Coward
      Big Brother

      retitle

      Not only are you missing something, but it's in the first paragraph of the article:

      "hand over the personal data they hold on every passenger entering or leaving the European Union"

      London-Edinburgh doesn't involve entering or leaving the EU.

    2. Andy Livingstone

      Geographically confused I admit

      Remind me which is outside EU Borders, please. Edinburgh? London?

    3. Bracknellexile

      You are...

      ...the bit that says, "every passenger entering or leaving the European Union."

  3. Anonymous Coward
    Anonymous Coward

    Finally

    Somebody that gets it.

  4. Anonymous Coward
    Black Helicopters

    Again......

    It takes Europe to take a stand.

    1. Dan 55 Silver badge
      Black Helicopters

      Possibly

      It was the EU who agreed to it in the first place.

      Perhaps you mean it takes toothless European watchdogs or the toothless European parliament to take a stand, who are then politely ignored?

  5. Gulfie
    Happy

    Bad news for the Home Office eBorders project?

    On the back of identity cards, could this cause the death of eBorders?

  6. Anonymous Coward
    Stop

    So where does this leave the EU -> US data transfer?

    If the EU can't come up with a good reason to collect data on everyone (including non-EU citizens) entering the EU, then where does this leave the EU's data grab agreement with the US?

    Surely, the conclusion must be that the EU will find it increasingly difficult to justify meeting US demands to pass all US-bound passenger data to the US; data that INCLUDES EU citizens.

    1. Fred Flintstone Gold badge
      Stop

      .. not to mention a US -> EU transfer

      I still haven't found a credible answer why the EU doesn't ask for US data to be submitted along the same conditions. As far as I know, the original 9/11 boys were resident there.

      I mean, it's SUPPOSED to be for fighting crime, but the US is not even bothering anymore to keep up that pretense.

  7. Anonymous Coward
    Anonymous Coward

    Nice to hear, ...

    ... but whether it'll do anything? The way various data"sharing" shticks got pushed through fails to inspire confidence in the integrity of all the cogs, large and small alike, that make the EU machinery "work".

    I also note that "privacy" still is very much an ad-hoc tick box-item that's mosty there for the sake of lip service, if it's there at all. What about an overarching privacy-enforcing structure, in the "defend by default" sense?

  8. BristolBachelor Gold badge
    Coffee/keyboard

    WTF!

    <cough> <splutter> Have I been transported to a parallel dimension?

    Thank you for seeing sense (at last).

    This makes a change from the "we will protect you from terrorism by locking everyone away in their own solitary confinement, videoing everything you do 24 hours a day"

  9. Anonymous Coward
    FAIL

    Doesn't stop ne'er do wells ...

    Travelling around killing people whilst using false British, and Irish come to that, passports.

  10. dssf

    emails or email addresses?

    I realize they are looking for contact information, but the article is probably in need of clarification.

    If they are after EMAIL, then they are rifling through every last known direct and peripheral contact or note card or addressee of a person of interest. If they are using commingled emails and hand phone contacts, then this is where Google's in-the-recent-past mandatory synching is truly evil. On-the-go addressees in the hand phone get or got synched with one's gmail or related account. Old cruft i never WANTED in my android hand phone got shoved onto me. If the law enforcement agencies want that data, though, they'll get it, sycnced or not.

    Think of this application: Visual Analytics and JMP:

    http://www.jmp.com/

    http://www.visualanalytics.com/

    http://www.visualanalytics.com/default.cfm?Tier=3&MenuItemName=CombatTerrorismSolutions&URL=%2Fsolutions%2FcombatingTerrorism%2Ecfm

    This software I first noticed around year 2000. While it is deeply invasive in the authorized hands, it can be DEEEEEPLY invasive give its full power.

    http://www.visualanalytics.com/solutions/images/intelligenceB.gif

    http://www.visualanalytics.com/default.cfm?Tier=2&MenuItemName=InvestigationSolutions&URL=%2Fsolutions%2FcriminalInvestigation%2Ecfm

    Money Laundering analysis is a particularly interesting area of this app.

    Think you can hide behind proixies, anonymizers, and 250 routers, brouters, bridges and virtual networks? Think again.

  11. Anonymous Coward
    Happy

    Common Sense?

    Stop, you're killing my brainz.

  12. dssf

    email or email contacts?

    I realize they are looking for contact information, but the article is probably in need of clarification.

    If they are after EMAIL, then they are rifling through every last known direct and peripheral contact or note card or addressee of a person of interest. If they are using commingled emails and hand phone contacts, then this is where Google's in-the-recent-past mandatory synching is truly evil. On-the-go addressees in the hand phone get or got synched with one's gmail or related account. Old cruft i never WANTED in my android hand phone got shoved onto me. If the law enforcement agencies want that data, though, they'll get it, sycnced or not.

    Think of this application: Visual Analytics and JMP:

    http://www.jmp.com/

    http://www.visualanalytics.com/

    http://www.visualanalytics.com/default.cfm?Tier=3&MenuItemName=CombatTerrorismSolutions&URL=%2Fsolutions%2FcombatingTerrorism%2Ecfm

    This software I first noticed around year 2000. While it is deeply invasive in the authorized hands, it can be DEEEEEPLY invasive give its full power.

    http://www.visualanalytics.com/solutions/images/intelligenceB.gif

    http://www.visualanalytics.com/default.cfm?Tier=2&MenuItemName=InvestigationSolutions&URL=%2Fsolutions%2FcriminalInvestigation%2Ecfm

    Money Laundering analysis is a particularly interesting area of this app.

    Think you can hide behind proixies, anonymizers, and 250 routers, brouters, bridges and virtual networks? Think again.

  13. John Smith 19 Gold badge
    Flame

    "demonstrate the necessity and the proportionality of a system"

    Not necessary.

    Not proportional.

This topic is closed for new posts.

Other stories you might like