Switzerland

Non-Eyes state with cable reconnaissance powers, the Crypto AG legacy, and systematic rejection of US surveillance vendors

Overview

Switzerland is a non-EU member state bound by the European Convention on Human Rights and participating in the Schengen area. It is not a member of any Eyes alliance (neither Five Eyes, Nine Eyes, nor Fourteen Eyes), a position that has contributed to its reputation as a jurisdiction for privacy-oriented technology services. However, that reputation must be weighed against a more complicated history.

The Crypto AG scandal, revealed in 2020, exposed decades of secret collaboration between Swiss intelligence and the CIA through a Swiss-based encryption company that sold deliberately weakened equipment to over 120 governments. The CIA called it “the intelligence coup of the century.”[1] Switzerland’s Intelligence Service Act (NDG) authorises cable reconnaissance (bulk interception of cross-border fibre-optic communications) and computer network exploitation, though a December 2025 Federal Administrative Court ruling found these practices incompatible with fundamental rights.[2]

On the privacy side, the revised Federal Act on Data Protection (FADP/nDSG), effective September 1, 2023, modernised Swiss data protection law with GDPR-compatible standards while retaining distinctly Swiss features. Switzerland has rejected Palantir Technologies at least nine times over seven years, citing concerns about US intelligence access to sensitive data.[3] Banking secrecy, codified since 1934, has been substantially eroded through the Automatic Exchange of Information with 100+ countries.

Privacy Framework

The FDPIC (Federal Data Protection and Information Commissioner) is an independent authority supervising compliance with data protection law. Under the revised FADP (September 2023), the FDPIC gained power to issue legally binding administrative orders, a significant upgrade from the previous regime where only non-binding recommendations were possible. However, the FDPIC cannot impose fines — criminal penalties of up to CHF 250,000 are imposed on responsible natural persons (not organisations), prosecuted by cantonal authorities.[4][5]

The FADP protects only natural persons (aligning with GDPR), introduces the “effects doctrine” for extraterritorial application, distinguishes between ordinary and “high-risk” profiling, does not require mandatory DPOs, and sets breach notification at “as soon as possible” rather than the GDPR’s 72 hours. Unlike the GDPR’s closed list of legal bases, the FADP uses a principle-based approach where processing is generally permitted unless it violates personality rights. Switzerland maintains EU adequacy (first granted 2000, renewed January 2024) and approved the Swiss-US Data Privacy Framework in September 2024.[6][7]

Surveillance Laws

BÜPF – Federal Act on the Surveillance of Post and Telecommunications (2018)

The BÜPF governs lawful interception by law enforcement. The 2018 revision substantially expanded capabilities:[8]

  • Lawful interception: Only in criminal proceedings (not preventive). Ordered by prosecutors, approved by court. Metadata access requires court order; subscriber data does not
  • GovWare (state trojans): Government malware on suspects’ devices, subject to subsidiarity (only when other measures fail). The FDPIC criticised the authorised offence catalogue as “too comprehensive”
  • IMSI catchers: Cell tower simulation devices for mobile interception, requiring judicial authorisation

The Dienst ÜPF (Post and Telecommunications Surveillance Service) implements surveillance measures, serving cantonal prosecutors, the Attorney General, and the Federal Intelligence Service.

NDG – Federal Intelligence Service Act (2017)

The NDG was approved by referendum with 65.5% support and entered into force September 1, 2017. Key capabilities:[9]

  • Cable reconnaissance (Kabelaufklärung): Bulk interception of cross-border fibre-optic communications, filtered using selectors. Swiss nationals and residents are exempt from targeting
  • Computer network exploitation: Remote infiltration of computer systems, including webcam activation and trojan deployment, both domestically and abroad

Triple-Lock Authorisation

Special intelligence-gathering measures require three-stage approval: (1) Federal Administrative Court, (2) heads of the Departments of Defence, Justice, and Foreign Affairs, (3) Federal Council Security Committee. However, the December 2025 FAC ruling found this mechanism insufficient in practice to protect fundamental rights.[2]

Procedural Safeguards

The Swiss Criminal Procedure Code (StPO) requires post-surveillance notification to targets, access to results, right to independent expert review, right to challenge in court, and damages for successful challenges. Metadata obtained without judicial authorisation is inadmissible.[10]

Intelligence Services

NDB / FIS – Federal Intelligence Service

Established January 1, 2010 by merging the DAP (domestic security) and SND (foreign intelligence). Responsible for counter-terrorism, counter-espionage, counter-proliferation, and critical infrastructure protection. The NDB collaborates with over 100 foreign intelligence agencies (12,500 notifications received and 6,000 sent in 2017). A separate Military Intelligence service (MND) operates within the armed forces.[11]

Alliance Status: Non-Member with Extensive Cooperation

Switzerland is not a member of the Five Eyes, Nine Eyes, Fourteen Eyes, or Maximator alliances. However, its independence is more nuanced than formal non-membership suggests:[12]

  • Club de Berne: Switzerland is a founding member (established 1969, co-initiated by Switzerland and named after Bern), now comprising intelligence services of all 27 EU states plus Norway and Switzerland
  • Counter Terrorism Group (CTG): Active participant with substantially overlapping Club de Berne membership
  • Focused cooperation: Listed among countries participating in computer network exploitation cooperation with Five Eyes nations

Crypto AG / Operation Rubicon

Revealed February 2020 by the Washington Post, ZDF, and SRF. Crypto AG, a Swiss-based encryption manufacturer, was secretly co-owned by the CIA and the West German BND from 1970 to 2018. They sold deliberately weakened encryption equipment to over 120 governments (including Iran, India, Pakistan, and Latin American nations), enabling the CIA and BND to read their encrypted communications. The BND sold its stake around 1993; the CIA maintained sole ownership until approximately 2018.[1]

The GPDel (Parliamentary Control Delegation) investigation found that Swiss intelligence (SND) knew the CIA was behind Crypto AG as far back as 1993 and subsequently collaborated. The report stated: “The Swiss authorities share responsibility for the activities of Crypto AG.” Current ministers were only informed in autumn 2019, months before media revelations.[13]

Oversight Bodies

AB-ND: Independent Oversight Authority for Intelligence Activities, established by the NDG. GPDel: Parliamentary Control Delegation with wide-ranging inspection rights. FDPIC: Checks legality of domestically collected intelligence data. Federal Audit Office: Financial oversight. The multi-layered structure reflects Swiss political culture, though Operation Rubicon showed it can fail when activities are concealed for decades.[14]

Data Sovereignty: Rejecting Palantir

Swiss federal agencies have rejected Palantir Technologies at least nine times over seven years. In 2020, military evaluators rejected a Palantir bid for an intelligence service IT system, concluding it was unclear whether sensitive data could be safeguarded from US intelligence access. The Federal Office of Public Health chose competitors for pandemic management. The pattern reflects an institutional assessment that Palantir’s ties to US intelligence (initially funded by the CIA’s In-Q-Tel, extensive NSA/CIA contracts) create unacceptable sovereignty risks.[3]

This contrasts sharply with other privacy-conscious jurisdictions: the UK awarded Palantir £330M (NHS) and £240M (MOD), France renewed its DGSI contract, Denmark deployed POL-INTEL, and Germany allows three states to use Palantir despite federal concerns.[15]

However, investigative reporting in October 2023 revealed that Predator spyware (Intellexa/Cytrox) had been sold to Switzerland among 25 identified purchaser countries.[16]

Banking Secrecy and Financial Privacy

Article 47 of the Federal Act on Banks and Savings Banks (1934) makes disclosure of client information a federal crime punishable by up to five years’ imprisonment and CHF 250,000 fines. This transformed a civil-law tradition into one of the most widely recognised financial privacy regimes.[17]

However, banking secrecy has been substantially eroded since 2009 under international pressure. Switzerland adopted the Automatic Exchange of Information (AEOI) standard in 2017, with first exchanges in 2018. As of 2024–2026, AEOI covers 100+ partner countries, with millions of accounts shared annually (balances, interest, dividends, financial income, account holder identity). Crucially, AEOI applies only to foreign account holders; Swiss residents’ banking information is not exchanged automatically, meaning banking secrecy remains functionally intact domestically.[18]

Cryptography and Export Controls

The development, manufacturing, and use of cryptographic products is unrestricted within Switzerland. No authorisation, licensing, or registration is required. Switzerland participates in the Wassenaar Arrangement for export controls on dual-use goods, administered by SECO (State Secretariat for Economic Affairs). An Ordinary General License covers exports to 23 trusted countries. Under the Embargo Act, Switzerland also applies import controls on surveillance technology based on human rights considerations. Following Operation Rubicon, Switzerland strengthened due diligence for cryptographic product exports.[19][20]

Data Retention

Telecommunications providers must retain metadata (not content) for 6 months, including traffic data, subscriber data, location data, and IP addresses. Content is excluded.[8]

VÜPF Expansion Controversy (2025–2026)

In January 2025, the Federal Council proposed expanding the VÜPF (implementing ordinance) to classify VPN services, encrypted messaging apps, social media, and email providers as telecommunications service providers subject to retention. The proposals included mandatory IP address logging for providers with 5,000+ users, mandatory identity verification (banning anonymous access), and potential obligations to build encryption backdoors.[21]

The backlash was severe: Swiss-based companies began relocating servers abroad, Proton relocated CHF 100 million in infrastructure to Germany and Norway, and 19 civil society organisations (including EDRi, Amnesty International, Privacy International) published an open letter demanding abandonment of the proposals. Parliament paused the process in December 2025, commissioning an independent impact analysis before any new draft.[22][23]

International Data Sharing Agreements

Despite Switzerland’s non-membership in Eyes alliances and robust domestic framework, extensive international agreements provide foreign agencies with pathways to access Swiss person data.

Mutual Legal Assistance: Layered Framework

Switzerland’s MLA framework is governed domestically by the Federal Act on International Mutual Assistance in Criminal Matters (IMAC/IRSG). The Federal Office of Justice serves as the central authority.[24]

Council of Europe (50 signatory states): The European Convention on Mutual Assistance in Criminal Matters (1959) and its Additional Protocols provide MLA coverage with all Council of Europe members and additional signatory states.

Bilateral MLATs: Switzerland has pursued an extensive bilateral treaty network, initially with European countries, later expanding to Anglo-American states, Latin America, Asia, and North Africa, and more recently to emerging financial centres (Indonesia, Kenya, Qatar). Confirmed bilateral MLA treaties include:[25]

  • Americas: United States (1973 — the first modern bilateral MLAT worldwide, establishing the template replicated globally), Canada, Ecuador, Mexico
  • Europe: Austria, France, Germany, Italy, Netherlands, Portugal, Spain
  • Asia-Pacific: Australia, Hong Kong, Philippines, Republic of Korea, Singapore

IMAC fallback (worldwide): Under the IMAC, Switzerland can provide mutual legal assistance even without a treaty. Some partner states, however, cannot offer assistance without a treaty basis, which drives Switzerland’s ongoing treaty expansion programme. The Federal Office of Justice also uses Memoranda of Understanding as preliminary instruments with states not yet ready for formal treaty negotiations.[24]

Club de Berne: Counter-Terrorism Intelligence

As a founding member of the Club de Berne (1969), Switzerland has participated in European intelligence sharing for over five decades. The network now comprises all 27 EU intelligence services plus Norway and Switzerland. The Counter Terrorism Group (CTG) operates in parallel with substantially overlapping membership.[12]

Schengen Information System (SIS II)

Switzerland’s Schengen association (operational since 2008) means alerts entered by Swiss police are visible in real time across all Schengen countries, and vice versa. The Schengen Data Protection Act (SDPA) (2018) governs data processing in Schengen contexts.[26]

Prüm Decision: Biometric Data Exchange

Switzerland participates in automated cross-border exchange of DNA profiles, fingerprints, and vehicle registration data. The Prüm II Regulation (2024) expands this to facial images and police records.[27]

Financial Data Sharing

AEOI: Automatic exchange of bank account information with 100+ countries (described in Banking Secrecy section).

SWIFT/TFTP: Swiss persons’ international wire transfers are subject to US Treasury access under the Terrorist Finance Tracking Program.[28]

Egmont Group: The Swiss FIU shares financial intelligence across 164+ Financial Intelligence Units worldwide.

Other Frameworks

Interpol I-24/7: Switzerland participates in Interpol’s global police network (195 countries). Europol: Cooperation agreement enabling strategic and technical intelligence exchange; Europol maintains FBI cooperation, meaning Swiss intelligence may flow onward to US law enforcement. PNR: Swiss air carriers transfer passenger data to US CBP for US-bound flights.[29]

The Privacy Backdoor Effect

Despite non-membership in Eyes alliances, the FADP, and NDG triple-lock authorisation, international agreements create alternative access pathways:

  • 1973 MLAT + IMAC: US and 50+ Council of Europe states can request data through MLA channels
  • Club de Berne: Counter-terrorism intelligence sharing with 29 intelligence services
  • Schengen SIS II: Real-time alert sharing across all Schengen countries
  • Prüm Biometrics: Automated DNA, fingerprint, and vehicle queries across Schengen states
  • AEOI: Banking data shared automatically with 100+ countries, eroding the traditional secrecy regime
  • SWIFT/TFTP: International wire transfers subject to US Treasury subpoena
  • Europol-FBI Channel: Intelligence shared with Europol potentially accessible to US FBI

Recent Developments

FAC Cable Surveillance Ruling (December 2, 2025)

The Federal Administrative Court ruled that cable reconnaissance and radio surveillance as practiced by the NDB are incompatible with the Federal Constitution and the ECHR. The court found insufficient protection against misuse, no instruments protecting journalistic sources or lawyer-client communications, and neither effective oversight nor legal remedy for affected parties. The legislature has a five-year transitional period; if a compliant system is not in place by 2030, cable and radio surveillance must be discontinued entirely.[2][30]

NDG Revision Packages (2025–2026)

The Federal Council is pursuing multi-part NDG revision. The basic package dispatch was submitted to Parliament on February 13, 2026, extending the FIS mandate to all of cyberspace, authorising data collection from financial intermediaries, and strengthening AB-ND oversight. The controversial proposal to allow surveillance of persons with professional secrecy (lawyers, doctors) was dropped. A separate cable reconnaissance reform track addresses the FAC ruling’s 2030 deadline.[31][32]

VÜPF Surveillance Expansion Paused

The data retention expansion proposals (described above) were paused following industry backlash and the December 2025 parliamentary motion requiring an independent impact analysis before any new draft.[23]

Swiss-US Data Privacy Framework Stability

The Framework remains operational but faces uncertainty after the termination of all three Democratic PCLOB members in January 2025, leaving the board without a quorum. The PCLOB plays a central role in the redress mechanism. Legal commentators recommend maintaining SCCs as a precautionary fallback.[33]

Sources

[1] Washington Post: The Intelligence Coup of the Century (February 2020) – CIA/Crypto AG revelations, Operation Rubicon
[4] Adnovum: Swiss Federal Act on Data Protection 2023 – FDPIC powers, binding orders, no fine authority
[5] Mondaq: Who Will Be Penalised Under the New FADP? – CHF 250,000 individual penalties
[6] Secure Privacy: Switzerland’s New FADP – Key Changes – Effects doctrine, profiling, no mandatory DPO
[8] MLL Legal: Revised Federal Act on Surveillance (BÜPF 2018) – GovWare, IMSI catchers, metadata retention
[9] Wikipedia: Intelligence Service Act (Switzerland) – NDG, cable reconnaissance, triple-lock, 65.5% referendum approval
[11] Wikipedia: Swiss Intelligence Agencies – NDB formation (2010), international cooperation statistics
[12] ETH Zürich ISN Blog: Oversight and Intelligence Services – Switzerland – Club de Berne founding, CNE cooperation
[14] Intelligence Oversight: Switzerland – AB-ND, GPDel functions
[15] JVL: Palantir OK for UK But Not Switzerland – Contrast with UK, France, Denmark, Germany procurement
[16] Bleeping Computer: Intellexa/Cytrox Predator Spyware – Switzerland among 25 purchaser countries
[17] Goldblum: Bank Secrecy in Switzerland – Article 47, criminal penalties, five years imprisonment
[19] Cryptographie en Suisse: Considérations légales – Unrestricted domestic encryption use
[20] BIS: Switzerland Export Control Information – Wassenaar, SECO, OGL for 23 countries
[22] EDRi: Open Letter on Swiss Data Retention (February 2026) – 19 organisations, Proton CHF 100M relocation
[23] TechRadar: Switzerland Revises Proposal After Backlash – Parliamentary pause, impact analysis
[24] Federal Office of Justice: Expansion of the State Treaty Framework – IMAC framework, bilateral treaty programme, MoU instruments
[25] Swiss Federal Office of Justice: Guide to International Mutual Assistance in Criminal Matters (PDF) – 1973 US MLAT as first modern bilateral treaty, IMAC procedures
[26] European Commission: Schengen Information System – Real-time alert sharing
[27] European Commission: Prüm Framework – Biometric data exchange, Prüm II expansion
[29] Europol: Partners & Collaboration – Switzerland cooperation agreement, FBI channel
[30] Heise: Court Halts Mass Surveillance of Swiss Intelligence Service – Five-year deadline, 2030 discontinuation
[31] Digitec: Intelligence Service Act Expansion – NDG revision packages, professional secrecy dropped
[32] Swiss Federal Council: NDG Basic Package Dispatch (February 13, 2026) – Cyberspace mandate, AB-ND strengthened
[33] IAPP: Trump Administration Impact on Data Privacy Framework – PCLOB terminations, SCC fallback recommended
← Back to Privacy Law Directory