Google asks DOJ if it can release details on government data requests
The lack of information on FISA orders is fueling speculation, misperceptions Internet search giant says
Computerworld - Google has sent a letter to U.S. Attorney General Eric Holder and FBI director Robert Mueller seeking permission to disclose specific details about the information it is required to provide to the government in response to requests for user data from U.S. intelligence agencies.
The letter, by Google's chief legal officer David Drummond, is part of an attempt by the company to correct what it says are misperceptions about the nature of the data it provides under Foreign Intelligence Surveillance Act (FISA) orders.
"We have always made clear that we comply with valid legal requests," Drummond said in a blog post today. "Assertions in the press that our compliance with these requests gives the U.S. government unfettered access to our users' data are simply untrue."
A recent report published by The Washington Post had identified Google as one of nine Internet companies from whom the government is directly collecting user data under a secret program called PRISM.
The story described PRISM as an anti-terror effort under which the NSA and the FBI were intercepting data directly from servers at Google, Microsoft, Facebook, YouTube, Skype and other Internet companies.
Though details of PRISM program are new, the FBI and other intelligence agencies have in the past made no secret of their desire to monitor real-time traffic on Facebook and other sites for signs of terrorist activity. For example, in a request for information last year, the FBI said it was seeking technology that would help it quickly gather and analyze data posted on sites such as Facebook, Twitter and on blogs using simple keyword searches and phrases such as "bomb," "suspicious package," "white powder," "active shoot" and "school lock down."
The FBI has noted that such technology is vital to helping it monitor real-time communications by terrorists and suspected terrorists on these sites.
The Post report came just one day after The Guardian published a dramatic story about a secret NSA phone call records collection program. The stories have sparked considerable concern about extensive domestic surveillance by U.S. intelligence agencies.
Google, Facebook, Microsoft and the others have categorically denied that they have ever voluntarily provided any user data to the government. Though a slide from a classified document obtained by the Post appeared to show that the government was collecting user data directly from servers at these companies, all the firms named in the document have flatly denied this is happening.
The apparent disconnect between the information in the slides and the denials by the companies has fueled speculation on the nature of PRISM technology and how exactly it is being used.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- Agility & Scalability for Oracle EBS R12 and RAC on VMware vSphere 5 This white paper outlines extensive performance and scalability testing of Oracle EBS applications on a Vblock™ Systems with vSphere 5.
- Oracle and VCE: The Next Step in Integrated Computing Platforms In this ESG Lab review you will learn how a VCE system driven by Oracle, delivers the perfect blend of high performance and...
- Migrate Oracle Apps from RISC/UNIX to Virtualized x86 Ready to move Oracle to a virtualized environment? This brief explains how true converged infrastructure can help you migrate from a RISC/UNIX environment...
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!