Scope of NSA's phone data snooping is 'breathtaking'
Privacy advocates say reports about the operation confirm long-held fears
Computerworld - Although U.S. government officials said the National Security Agency's efforts to secretly collect phone records of millions of Verizon customers is nothing new, reports about its size confirmed long-standing fears among privacy and civil rights advocates.
"A lot of us had our suspicions," said Ian Glazer, an analyst with Gartner. "But the scope [of the data collection] is still breathtaking. It is a sad reaffirmation of some of our worst fears about what the government is doing to collect our information."
He called government officials' defense of the data collection disingenuous and argued that, in many ways the metadata being collected by the NSA under court order is even more invasive than the actual content of phone conversations.
The data allows the agency to build a detailed profile of every single Verizon customer, especially when the call records are combined with information in other databases, Glazer said. Though the court order does not require Verizon to provide customer names and addresses, the NSA can get that information easily.
Glazer said it's unclear why the NSA might need such a broad dataset. "Maybe it is easier for them to say, 'Give me everything' than be specific about what they are actually looking for."
Controversy about the program arose on Wednesday when The Guardian said it had obtained a document showing that the NSA has been collecting call records of all Verizon customers under a top-secret court order issued in April.
The order, a copy of which was published by the paper, requires Verizon to hand over on an "ongoing and daily basis" the details of all domestic and international calls made by its customers. The order, signed by Judge Roger Vinson of the U.S. Foreign Intelligence Surveillance Court (FISC), requires Verizon to give the NSA the originating and dialed number of every call made by its customers daily.
It also requires Verizon to provide other details like the time and duration of a call, telephone calling card numbers and any unique identifiers such as the International Mobile Station Equipment Identity Numbers used to identify mobile phones. The order specifically excludes other critical data like the name or address of the subscriber or the actual content of the calls.
The court order is effective until July 19 and prohibited Verizon from disclosing that it has even received such an order or was supplying information to the NSA.
After the story appeared, Obama Administration officials and lawmakers scrambled to tamp down the resulting uproar.
Senate Intelligence Committee Chairwoman Dianne Feinstein (D-CA) and other committee members, including Sen. Saxby Chambliss, (R-GA), argued that the order is similar to others that have been routinely issued in recent years.
"This is nothing particularly new," Chambliss told USA Today. "This has been going on for seven years under the auspices of the (Foreign Intelligence Surveillance Act) authority and every member of the United States Senate has been advised of this."
House Intelligence Committee Chairman Mike Rogers (R-MI) said data gathered by the NSA had helped the agency thwart a significant terrorist threat in the past few years, but he declined to provide any specifics on the threat.
Meanwhile, the Washington Post quoted White House spokesman Josh Earnest saying that the order was a critical tool for intelligence agencies fighting terrorism.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Market Overview: Digital Customer Experience Delivery Platforms Forrester states that businesses today struggle to understand and use the tools necessary to create and manage unified, multichannel digital customer experiences across...
- The Growing Demand for Rich Media This white paper discusses how IBM Customer Experience Suite Rich Media Edition can automate rich media workflows, from collaborating with creative agencies and...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!