Qwest praised for declining NSA phone records request
EFF lauds company's sense of responsibility
IDG News Service - A civil liberties group praised telecommunications carrier Qwest Communications International Inc. for refusing to turn over its customers' phone records to a U.S. spy agency.
The Electronic Frontier Foundation (EFF) applauded Qwest's decision not to participate in a broad surveillance program, run by the U.S. National Security Agency (NSA), even though other large carriers have apparently complied. In January, the EFF filed a class-action lawsuit against AT&T Inc. for its alleged participation in the NSA's "massive and illegal program to wiretap and data-mine Americans' communications."
"In our country, we follow the law," said Rebecca Jeschke, the EFF's media coordinator. "We don't follow orders. Qwest decided it had a responsibility to its customers and also its shareholders to follow the law."
Without court-issued warrants, the NSA's collection of phone records violates federal law, according to the EFF and the Center for Democracy and Technology (CDT), another civil liberties group.
<i>USA Today</i>, in a report published Wednesday, said the NSA has secretly collected the phone call records of "tens of millions" of U.S. citizens since late 2001. Telecom carriers AT&T, Verizon Communications Inc. and BellSouth Corp. have participated in the NSA surveillance program, launched after the Sept. 11, 2001, terrorist attacks on the U.S., <i>USA Today </i>said.
Qwest declined to turn over phone records to the NSA when it discovered U.S. agents would not seek court approval, said Herbert J. Stern, lawyer for Joseph Nacchio, a former chief executive officer at Qwest.
The U.S. government approached Nacchio and asked for customer phone records in late 2001, Stern said in a statement released Friday. The phone records requests continued until Nacchio left Qwest in June 2002, Stern said. A federal grand jury in Colorado indicted Nacchio in December on 42 counts of insider trading.
Qwest asked "whether a warrant or other legal process had been secured in support of that request," Stern said. "When he learned that no such authority had been granted and that there was a disinclination on the part of the authorities to use any legal process ... Mr. Nacchio concluded that these requests violated [federal] privacy requirements. Accordingly, Mr. Nacchio issued instructions to refuse to comply with these requests."
President George Bush on Thursday defended his administration's terrorist-fighting methods, saying government agents are not monitoring the individual phone calls of "innocent Americans." Instead, the NSA has monitored records to detect calling patterns that suggest terrorist activity, <i>USA Today </i>reported.
But the CDT called on Congress to take "a comprehensive, in-depth and public inquiry into the scope of warrantless domestic surveillance."
"Congress and the American people can no longer be asked to simply accept the administration's vague assurances that the NSA spying programs are not infringing on the rights of ordinary Americans," CDT said in a statement.
But many U.S. residents don't seem to object to surveillance programs that could catch terrorists, said Jeff Kagan, an independent telecom analyst. Kagan doesn't see a market advantage for Qwest in its decision not to participate in the program, because the issue is more "political" than market-driven, he said.
"The government and the companies can't win no matter what they do," Kagan said in an e-mail. "If they do this to protect us we will complain. If they do nothing and we get attacked again, we will complain. So I guess in this dangerous world, we need to deal with some extra meddling even though we would rather not."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts