Submersive Security: How The Data Protection Efforts Of DCNS Were Torpedoed