Qwest praised for declining NSA phone records request
EFF lauds company's sense of responsibility
IDG News Service - A civil liberties group praised telecommunications carrier Qwest Communications International Inc. for refusing to turn over its customers' phone records to a U.S. spy agency.
The Electronic Frontier Foundation (EFF) applauded Qwest's decision not to participate in a broad surveillance program, run by the U.S. National Security Agency (NSA), even though other large carriers have apparently complied. In January, the EFF filed a class-action lawsuit against AT&T Inc. for its alleged participation in the NSA's "massive and illegal program to wiretap and data-mine Americans' communications."
"In our country, we follow the law," said Rebecca Jeschke, the EFF's media coordinator. "We don't follow orders. Qwest decided it had a responsibility to its customers and also its shareholders to follow the law."
Without court-issued warrants, the NSA's collection of phone records violates federal law, according to the EFF and the Center for Democracy and Technology (CDT), another civil liberties group.
<i>USA Today</i>, in a report published Wednesday, said the NSA has secretly collected the phone call records of "tens of millions" of U.S. citizens since late 2001. Telecom carriers AT&T, Verizon Communications Inc. and BellSouth Corp. have participated in the NSA surveillance program, launched after the Sept. 11, 2001, terrorist attacks on the U.S., <i>USA Today </i>said.
Qwest declined to turn over phone records to the NSA when it discovered U.S. agents would not seek court approval, said Herbert J. Stern, lawyer for Joseph Nacchio, a former chief executive officer at Qwest.
The U.S. government approached Nacchio and asked for customer phone records in late 2001, Stern said in a statement released Friday. The phone records requests continued until Nacchio left Qwest in June 2002, Stern said. A federal grand jury in Colorado indicted Nacchio in December on 42 counts of insider trading.
Qwest asked "whether a warrant or other legal process had been secured in support of that request," Stern said. "When he learned that no such authority had been granted and that there was a disinclination on the part of the authorities to use any legal process ... Mr. Nacchio concluded that these requests violated [federal] privacy requirements. Accordingly, Mr. Nacchio issued instructions to refuse to comply with these requests."
President George Bush on Thursday defended his administration's terrorist-fighting methods, saying government agents are not monitoring the individual phone calls of "innocent Americans." Instead, the NSA has monitored records to detect calling patterns that suggest terrorist activity, <i>USA Today </i>reported.
But the CDT called on Congress to take "a comprehensive, in-depth and public inquiry into the scope of warrantless domestic surveillance."
"Congress and the American people can no longer be asked to simply accept the administration's vague assurances that the NSA spying programs are not infringing on the rights of ordinary Americans," CDT said in a statement.
But many U.S. residents don't seem to object to surveillance programs that could catch terrorists, said Jeff Kagan, an independent telecom analyst. Kagan doesn't see a market advantage for Qwest in its decision not to participate in the program, because the issue is more "political" than market-driven, he said.
"The government and the companies can't win no matter what they do," Kagan said in an e-mail. "If they do this to protect us we will complain. If they do nothing and we get attacked again, we will complain. So I guess in this dangerous world, we need to deal with some extra meddling even though we would rather not."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts