The journey of a file - part 1

The journey of a file - part 1
Metadata
Date: 2026/01/06
Author: Roel van Cruchten
Reading Time: 19 min read
Tags:
privacylegalsecurity
Share:
Article

This article is part of a series: The journey of a file - The risk of US access.

Transit point 0: Internet Network

Every standard online activity, from sending an email to transferring a large file, relies on the physical infrastructure of the internet known as the backbone. Historically, this hierarchy was dominated by Tier-1 networks: the “highways” of the internet that exchange massive volumes of traffic without charging each other fees (settlement-free peering). While American providers like Lumen and AT&T have always been prominent, Europe has maintained significant digital sovereignty through its own independent Tier-1 players like Deutsche Telekom and Arelion. Next to these global internet backbone Internet Service Providers (ISP’s), also regional and national carries (tier 2) and local providers (tier 3) exists.

However, a massive shift has occurred in recent years. Major “Hyperscalers” like Google, Meta, Amazon, and Microsoft have evolved from being customers of the internet to becoming the owners of its core. By 2025, these companies own or control roughly half of the world’s submarine cables, creating a private “Tier 0” backbone. Instead of using the public Tier-1 highways, they often link their data centers directly to local ISPs. This effectively flattens the internet, allowing data to move through private corporate networks that operate under their own internal policies rather than public standards.

It is not an entirely negative scenario, as these new routes introduce greater resilience and more standardization. However, the level of control they represent also raises concerns, particularly around data security and the risk of disruptions.

This shift complicates how your data travels. The path is determined by the Border Gateway Protocol (BGP), which acts as the internet’s global GPS. While BGP typically attempts to keep European traffic within the region to ensure speed, routing is ultimately a business decision. If a US-owned backbone offers a more efficient or cost-effective path, “local” traffic between two European cities there is always a chance that it traverse infrastructure controlled by American corporations.

This reality introduces distinct legal and even geopolitical risks. Under the US legal frameworks American agencies can issue orders to US-based companies to retrieve data moving through their networks, regardless of where that data is physically located.

Geopolitical risks

Geopolitical tension between US and China about the control over the undersea fiber-optic cable industry has significantly increased last years. In the early years of global telecommunications, cables were built primarily by private consortia to meet demand for faster and higher-capacity connectivity. But as China’s tech and industrial footprint grew, Beijing’s state-linked firms began investing heavily in manufacturing, maintaining, and even financing undersea cable projects. For the US and Europe, this shift triggered alarms about foreign access to critical communications infrastructure and potential intelligence collection.

The U.S. government, alarmed that Chinese involvement could create opportunities for espionage or influence over global traffic flows, has intervened in multiple cable projects. See also example 2 in this document. Through regulatory pressure, incentives, and diplomatic engagement, Washington has steered contracts toward American or allied firms and blocked or rerouted projects involving Chinese entities, especially where such cables touch U.S. territory.

Security analysts and lawmakers have raised concerns that foreign involvement in undersea cable manufacturing, repair, or maintenance could serve as a “backdoor” into data streams. Since cables extend far from national borders and much of the infrastructure is owned and operated by a patchwork of private companies, the risk is not just theoretical: if components or repair activities can be influenced by state actors, the potential for covert access or tampering increases.

Congressional inquiries have even asked major U.S. tech companies to disclose the extent of Chinese involvement in the cable systems they rely on, underscoring how deeply integrated these networks are with global commerce and national security.

Beyond surveillance, undersea cables are now viewed through a military and geopolitical lens. Recent incidents, from suspected cable cuts in the Baltic Sea to disruptions near Taiwan, highlight how vulnerable these networks are. Reports indicate that state actors, including those linked to Russia and China, may damage cables as part of gray zone tactics intended to disrupt or pressure rivals without triggering open conflict. On the other hand, China also accuses the US of engaging in subsea spying activities.

Taiwan, acutely aware that its global connectivity and even economic resilience depends on these undersea links, has intensified patrols around critical cable routes, reflecting how undersea infrastructure now occupies center stage in regional security planning.

European sovereign infrastructure

While the US is wary of Chinese espionage, Europe is becoming increasingly wary of US interventions. In response to US and China’s undersea dominance, Europe is increasingly pushing for sovereign clouds and infrastructure: infrastructures that are legally and physically confined within European jurisdiction to protect data from foreign intelligence orders. While a total “kill switch” scenario where Europe goes dark is unlikely due to the continent’s already robust internal redundancy, the vulnerability lies also in jurisdiction and surveillance.

While you as an individual cannot re-route global fiber-optic cables to ensure your messages and file transfers remain ‘untouched’, you can influence this landscape by staying alert to where your data lives, choosing privacy-first tools that prioritize local routing and encryption, and supporting political initiatives that advocate for digital sovereignty.

Examples transit point 0

Two examples illustrating how the U.S. government has exerted influence over this transit point 0 in the past.

Example 1: Operation Eikonal

An example from two decades ago shows that the German spy agency BND (Bundesnachrichtendienst) worked together with the American NSA (American National Security Agency) in Operation Eikonal. Here the BND worked together with Deutsche Telecom (DT), they literally placed a splitter on a fibre cable, and data about German telecommunication and therefore also German citizens was copied by the NSA for their own use. DT had their thoughts about this all, it seems that cooperation was not totally free will. This happened between 2004 and 2008.

In 2018, Frankfurt based DE-CIX, the world’s largest internet exchange point, revealed that Germany’s foreign intelligence service, the BND, had been intercepting and copying large volumes of internet traffic passing through its Frankfurt exchange since at least 2009. The practice, carried out under strategic surveillance authorities, was later ruled unlawful by Germany’s Federal Administrative Court, which found that the indiscriminate monitoring of traffic at DE-CIX exceeded the BND’s legal mandate.

Example 2. FISA 702 and “Upstream” Collection

While discussions about data privacy often focus on software, the most profound risks exist at the physical layer of the internet. A prime example of US governance exercising control over this infrastructure is the “Upstream” collection program conducted under Section 702 of the Foreign Intelligence Surveillance Act (FISA).

Unlike US programs that request data from a specific app or service provider, often called “downstream collection” or PRISM, upstream collection occurs at the level of the “internet backbone”. Based on this Act, US intelligence firms collected and intercepted a lot of private data without having legal warrants. These warrantless backdoor searches were ruled unconstitutional. Changes where made to this bill in April 2024, but it still provides legal means to check a persons communications and transferred files and also in upstream collection.

Under this authority, the US government (with the compelled assistance of telecommunications giants like AT&T and Verizon) collects data directly from the fiber-optic cables, switches, and routers that carry global internet traffic. This means that as data pulses through the physical cables at the bottom of the ocean or through major internet exchange points, it is subject to “filtering” by US intelligence agencies.

This is not merely a theoretical concern; it was the primary technical reality that led the Court of Justice of the European Union to strike down the Privacy Shield in the Schrems II ruling.

The court found that because the US government can tap into the physical infrastructure to scan traffic for “selectors” (such as email addresses or IP addresses) without a specific warrant for European citizens, the physical layer itself becomes a site of legal vulnerability.

Geopolitical Gatekeeping: The Pacific Light Cable Network

Beyond active surveillance, the US government also exercises “governance access” by dictating where the physical infrastructure is allowed to exist. In recent years, the “Team Telecom” committee (an inter-agency group including the Department of Justice and Defense) has blocked major subsea cable projects based on national security concerns.

A landmark case is the Pacific Light Cable Network (PLCN), a massive undersea fiber-optic link funded by Google and Meta. While the cable was intended to connect the US to Hong Kong, the US government intervened, forcing the companies to disable the Hong Kong portion of the cable and reroute it to Taiwan and the Philippines.

This demonstrated that this physical transit point 0 is not a neutral utility, but is also geopolitical tool. For a business, this means that even if your data is encrypted, the very path it takes across the globe is subject to the strategic interests and judicial reach of the US government, regardless of where your company is headquartered.

Transit point 1: Hardware and OS

This transit point is the physical reality of your digital life: the laptop on your desk, the server in the rack, and the Operating System that is running it. While we often worry about the security of the cloud, we frequently forget that “the Cloud is just somebody else’s computer”, and almost every computer in Europe is built on American intellectual property.

The chips

Within the hardware the chips and the semiconductors like silicon where it is made from are the most crucial element in relation to US access ability. The vulnerability starts deep inside the silicon. Modern processors from US companies like Intel and AMD are not simply calculators; they contain a “computer within a computer.” Components like the Intel Management Engine (CSME) operate at a privilege level deeper than the operating system itself.

This subsystem has full access to the computer’s memory and network, running even when the device is seemingly turned off. While the US government forces manufacturers to disable this “black box” for their own high-security agencies, European businesses are left with these features active, creating a permanent, unfixable potential backdoor.

For servers, the risk is even more acute due to the Baseboard Management Controller (BMC). This tiny chip on the motherboard allows administrators to remotely reinstall operating systems, install or modify apps, and make configuration changes to large numbers of servers and even without the servers being turned on. Normally, administrators use this BMS only to perform necessary maintenance operations, but it can also be misused by hackers or under compulsion from a government authority.

However, the proprietary firmware that runs these chips is controlled by US vendors. If a vendor is compelled by a FISA order to push a malicious update to the BMC, US authorities could theoretically gain “God Mode” access to European data centers, capable of copying or deleting entire hard drives without the main operating system ever detecting an intrusion.

Chips trade

The global supply chain for chips effectively functions as a fragile triangle where the United States holds the intellectual reins. The “brains” of the computer, the CPU and GPU, are designed by American giants like Intel, AMD, and NVIDIA. This means the architecture itself contains US-mandated features, such as the Intel Management Engine discussed above, and is entirely subject to US export controls.

Manufacturing introduces a different kind of volatility. Because the actual fabrication of these chips happens mostly at TSMC in Taiwan, the entire system is exposed to a massive control risk. If geopolitical tensions in the Taiwan Strait were to escalate, or if the US pressured Taiwan to cut off supplies to specific regions, the flow of advanced chips could stop instantly.

This risk is even more acute with the rise of AI, where NVIDIA currently holds the keys to the future. It has a share of more then 80% in the global share for GPUs for AI compute. The US government already restricts who NVIDIA can sell its top-tier chips to, meaning that if a European industry falls out of favor in Washington, it could be denied the hardware necessary to compete in the global AI race.

Europe finds itself in a particularly paradoxical position regarding this supply chain. The Dutch company ASML is arguably the most important tech company in the world, building the lithography machines that make all advanced chips possible. Theoretically, this should give Europe massive leverage, but the reality is that the US government effectively dictates ASML’s export policy. Through mechanisms like the “Foreign Direct Product Rule”,

Washington successfully forced the Netherlands to stop selling machines to China, proving that even when Europe makes the machine, the US decides where it goes.

Operating systems

Hardware is of limited use without operating software, and in this area US firms remain dominant. Microsoft Windows and Apple macOS control most of the desktop market, while Google and Apple dominate mobile operating systems. These platforms are not passive tools but incorporate extensive telemetry by design. As the Dutch government highlighted in its Data Protection Impact Assessment of Windows (see example 2 below), such systems can transmit usage data, filenames, and behavioral information to servers under US jurisdiction, and users have limited practical ability to fully opt out of these mechanisms.

Auxiliary Hardware components and their firmware

Beyond the operating system, modern computers contain multiple auxiliary hardware components that run their own firmware and operate largely outside the user’s control. These include management controllers, embedded processors, network interfaces, and firmware such as UEFI and BIOS. Many of these components are developed by US based companies and are subject to US jurisdiction. Because they function below the operating system layer, they can theoretically provide access to system state, memory, or network traffic even when the main OS is hardened or replaced.

While there is no public evidence of routine mass surveillance, the existence of such mechanisms creates a structural risk. Under US law, companies can be compelled to provide access under secrecy orders, raising concerns that software control alone may not be enough to prevent foreign legal or intelligence access in complex hardware systems.

In 2017, WikiLeaks published a large archive of classified CIA documents known as Vault 7. These describe tools and malware that can persist on devices, including techniques to modify firmware and make persistence below the OS layer (for example, implants on Mac firmware and other low-level components that survive operating system reinstalls). The leaks do not prove these tools were broadly used against U.S. companies’ hardware, but they do show design and capability for firmware-level access.

There are no public, fully authenticated cases where the U.S. government used embedded firmware backdoors in commercial hardware to access user or company data. Intelligence capabilities such as those revealed in the Vault 7 leaks do show that agencies have developed firmware-level techniques to persistently access devices (not supported by government admissions). These disclosures support the theoretical risk that hardware below the OS is a potential vector for surveillance and access.

European alternatives

While this is the hardest transit point to make European, cracks in the monopoly are forming. Europe currently lacks a direct competitor to Intel or NVIDIA, although long term initiatives such as the European Processor Initiative and the open RISC V architecture aim to support the development of more sovereign chip designs. In the meantime, niche European companies like Germany’s Tuxedo Computers or the Netherlands based Fairphone demonstrate that hardware can be built with greater supply chain transparency, even though they still rely on foreign manufactured silicon.

The EU Chips Act and the Dresden Expansion

To secure its digital sovereignty and stabilize the hardware layer of the internet, the European Union has launched the EU Chips Act, a ambitious €43 billion framework designed to double Europe’s global semiconductor market share to 20% by 2030.

A cornerstone of this initiative is the ESMC (European Semiconductor Manufacturing Company) fabrication plant in Dresden, Germany. This is a joint venture led by TSMC (the world’s largest chipmaker) in partnership with Bosch, Infineon, and NXP. This €10 billion facility represents a massive shift toward domestic high-end manufacturing, specifically targeting the chips required for automotive, industrial, and network infrastructure.

However, building factories is only half the battle. Europe remains critically dependent on foreign markets for critical raw materials such as gallium, germanium, and rare earth elements, which are essential for semiconductor production. Currently, Europe produces very few of these materials internally, with China controlling over 80% of the global supply for several key elements. This creates a “bottleneck” vulnerability: even with the most advanced factories in Dresden, the European hardware layer remains susceptible to export original restrictions and supply chain shocks from abroad. To address this, the EU is concurrently pushing the Critical Raw Materials Act to diversify sourcing and encourage domestic mining and recycling. Part of this Act, to mitigate the dependency risks, the EU also launched the RESourceEU Action Plan in December 2025, which aims to mobilize €3 billion to support alternative supply projects and recycling efforts beginning in early 2026

Operating System alternatives

For businesses, one of the fastest ways to reduce operating system level telemetry is to migrate to Linux distributions such as SUSE or Debian, which offer greater transparency and control over data flows. For governments and operators of critical infrastructure, reducing dependence on proprietary operating systems subject to foreign jurisdictions is increasingly seen as a key step in limiting exposure to external legal and political pressures.

Examples transit point 1

Two examples illustrating how the U.S. government has exerted influence over this transit point 1 in the past.

Example 1 - Intel chips Management Engine, a backdoor?

For over a decade, security experts have warned that the Intel Management Engine (a tiny, separate computer physically built inside your main processor) could function as an, undetectable spy tool. While Intel historically claimed that this subsystem was essential and could not be disabled, that narrative collapsed in 2017. Researchers discovered a hidden “kill switch” buried deep within the chip’s code labeled the “High Assurance Platform” (HAP) bit. This undocumented switch was designed specifically for the NSA, proving that the US government forces manufacturers to disable surveillance features for their own high-security agencies while leaving them active for everyone else. It got widely seen as a security hazard, with advices how to turn it off.

Silicon-as-a-Service

Today, this technology has been rebranded as the Intel Converged Security and Management Engine (CSME), but a new, more direct control mechanism has emerged known as “Intel On Demand”. This model introduces “Silicon-as-a-Service,” where the processor contains powerful built-in accelerators that are physically present but locked by software. To access the full power of the hardware you purchased, you must download a cryptographically signed license certificate from Intel.

This architecture creates a structural dependency on proprietary firmware and feature-enablement mechanisms that are designed, controlled, and updated by a US-based vendor. Certain advanced capabilities are enabled or configured through vendor-controlled firmware, microcode, and provisioning processes that customers cannot independently audit or replicate.

While there is no public evidence that Intel systems require continuous contact with external licensing servers to maintain normal operation, this model concentrates control over critical functionality outside the physical and legal jurisdiction of the data center operator. In a sanctions or export-control scenario (such as those applied by the United States to companies like Huawei or Kaspersky) governments have demonstrated their ability to legally restrict the sale, support, or provisioning of technology by domestic vendors.

As a result, future access to firmware updates, feature enablement, replacement parts, or accelerator functionality could be limited or withdrawn through legal or contractual mechanisms rather than technical failure. Such restrictions would not necessarily power down existing servers, but they could prevent the use or renewal of specific capabilities relied upon by high-performance workloads, including AI acceleration or cryptographic offload, potentially forcing operators to degrade services or redesign systems under time pressure.

This represents not a proven “kill switch,” but a geopolitical and supply-chain risk inherent in deeply integrated, proprietary hardware platforms whose trust anchors and update authority remain external to the deploying organization.

Example 2 - Dutch DPIA’s and European audits on M365 and Windows OS

A notable example of regulatory scrutiny at the operating-system and application level comes from a series of Data Protection Impact Assessments (DPIAs) commissioned by the Dutch Ministry of Justice and Security. Starting in 2018, the Dutch government evaluated the data protection risks associated with products such as Microsoft Office 365 ProPlus and Windows 10/11 Enterprise, producing public assessments of how these products collect and process usage and diagnostic data. These DPIAs included analysis of telemetry data flows from Dutch public sector deployments to infrastructure outside the European Union.

The DPIAs identified issues related to the transfer and processing of usage and telemetry data outside the EU, which were considered significant enough to warrant contractual and technical mitigation measures negotiated with Microsoft. These assessments prompted the Dutch government to work with Microsoft to improve transparency, data-handling options, and compliance with the EU General Data Protection Regulation (GDPR).

At the EU-wide level, the European Data Protection Supervisor (EDPS) ( the independent watchdog responsible for EU institutions’ compliance with data protection law) found in March 2024 that the European Commission’s use of Microsoft 365 did not fully meet the requirements of EU data protection regulation. The EDPS’s decision concluded that the Commission had failed to ensure adequate safeguards for personal data transferred outside the EU/EEA and had not sufficiently specified data processing purposes in contractual arrangements with Microsoft.

Following the EDPS decision, the Commission was ordered to suspend certain data flows and bring its use of Microsoft 365 into compliance with EU rules by late 2024. In July 2025, the EDPS concluded that the Commission had implemented contractual and organisational changes that addressed those infringements.

These developments illustrate the data protection and sovereignty challenges that can arise when widely deployed operating systems and productivity suites (even at the highest enterprise level) collect and transmit user data across jurisdictions. They have raised broader concerns in Europe about dependency on software stacks developed and operated under non-EU legal regimes, particularly where personal or sensitive data may be subject to outside access under foreign legislation such as the U.S. CLOUD Act.

Within this act the American government can still compel U.S.-based providers to disclose data held by European subsidiaries, regardless of any private agreement or the client’s status. While companies can challenge these orders, the process is discretionary, leaving data legally vulnerable to foreign intervention despite the appearance of compliance.

This situation highlights a recurring regulatory impasse: contractual safeguards cannot fully neutralize the extraterritorial reach of U.S. surveillance law. The EDPS’s 2025 resolution appears to have been a pragmatic accommodation rather than a definitive technical solution, avoiding measures that could have effectively excluded U.S. providers and disrupted the functioning of European institutions.

For European organizations, the broader lesson remains that the “legal firewalls” offered by American hyperscalers provide, at best, limited protection. Digital sovereignty cannot be achieved through ever more complex contractual arrangements alone, but requires structural independence, including hosting critical data and systems on infrastructure that remains outside foreign jurisdictional control.