Scope of NSA's phone data snooping is 'breathtaking'
Privacy advocates say reports about the operation confirm long-held fears
Computerworld - Although U.S. government officials said the National Security Agency's efforts to secretly collect phone records of millions of Verizon customers is nothing new, reports about its size confirmed long-standing fears among privacy and civil rights advocates.
"A lot of us had our suspicions," said Ian Glazer, an analyst with Gartner. "But the scope [of the data collection] is still breathtaking. It is a sad reaffirmation of some of our worst fears about what the government is doing to collect our information."
He called government officials' defense of the data collection disingenuous and argued that, in many ways the metadata being collected by the NSA under court order is even more invasive than the actual content of phone conversations.
The data allows the agency to build a detailed profile of every single Verizon customer, especially when the call records are combined with information in other databases, Glazer said. Though the court order does not require Verizon to provide customer names and addresses, the NSA can get that information easily.
Glazer said it's unclear why the NSA might need such a broad dataset. "Maybe it is easier for them to say, 'Give me everything' than be specific about what they are actually looking for."
Controversy about the program arose on Wednesday when The Guardian said it had obtained a document showing that the NSA has been collecting call records of all Verizon customers under a top-secret court order issued in April.
The order, a copy of which was published by the paper, requires Verizon to hand over on an "ongoing and daily basis" the details of all domestic and international calls made by its customers. The order, signed by Judge Roger Vinson of the U.S. Foreign Intelligence Surveillance Court (FISC), requires Verizon to give the NSA the originating and dialed number of every call made by its customers daily.
It also requires Verizon to provide other details like the time and duration of a call, telephone calling card numbers and any unique identifiers such as the International Mobile Station Equipment Identity Numbers used to identify mobile phones. The order specifically excludes other critical data like the name or address of the subscriber or the actual content of the calls.
The court order is effective until July 19 and prohibited Verizon from disclosing that it has even received such an order or was supplying information to the NSA.
After the story appeared, Obama Administration officials and lawmakers scrambled to tamp down the resulting uproar.
Senate Intelligence Committee Chairwoman Dianne Feinstein (D-CA) and other committee members, including Sen. Saxby Chambliss, (R-GA), argued that the order is similar to others that have been routinely issued in recent years.
"This is nothing particularly new," Chambliss told USA Today. "This has been going on for seven years under the auspices of the (Foreign Intelligence Surveillance Act) authority and every member of the United States Senate has been advised of this."
House Intelligence Committee Chairman Mike Rogers (R-MI) said data gathered by the NSA had helped the agency thwart a significant terrorist threat in the past few years, but he declined to provide any specifics on the threat.
Meanwhile, the Washington Post quoted White House spokesman Josh Earnest saying that the order was a critical tool for intelligence agencies fighting terrorism.
- Privacy jitters derail controversial K-12 big data initiative
- 3 privacy violations you shouldn't worry about
- U.S. commercial drone industry struggles to take off
- Snowden leaks erode trust in Internet companies, government
- NSA phone metadata collection program renewed for 90 days
- NSA isn't evil, says noted civil libertarian
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to... All Privacy White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!