At Senate hearing, Google warns of 'splinternet' but NSA does not budge
Officials of a U.S. spy agency said declassification of certain information could harm national security
IDG News Service - The general counsel of a U.S. spying agency told a Senate committee Wednesday that if Internet companies provide information about the number of surveillance orders they receive for user data, it would alert the country's adversaries on which services to avoid.
The government defended its data collection and disclosure policies even as a representative from Google warned the senators that U.S. surveillance practices could lead to the break up of the Internet.
"Providing that information in that level of detail could provide our adversaries a detailed road map of which providers and which platforms to avoid in order to escape surveillance," said Robert Litt, general counsel in the Office of the Director of National Intelligence, and Brad Wiegmann, deputy assistant attorney general in the Department of Justice, in a statement in connection with the Senate hearing on "The Surveillance Transparency Act of 2013."
The proposed legislation aims to bring greater transparency in data collection by the National Security Agency.
Internet companies including Microsoft, Facebook, Google, Yahoo and LinkedIn have asked the Foreign Intelligence Surveillance Court to allow them to publish aggregate data about any orders or directives they have received under the Foreign Intelligence Surveillance Act and related statutes.
The companies are trying to counter adverse publicity from disclosures by former National Security Agency contractor Edward Snowden that suggest that some Internet companies provide real-time access to user content on their servers to the NSA, which the companies have denied. The companies are allowed to reveal the number of surveillance requests only if they lump them together with other requests from U.S. law enforcement agencies.
Litt's statement, however, indicated that the government is not willing to give much ground on the secrecy surrounding its data collection, which according to documents released by Snowden and the government includes bulk collection of phone metadata and user content on the Internet.
While it is "possible and appropriate" to provide information on targets of surveillance, "counting the number of persons or of U.S. persons whose communications are actually collected, even if they're not the targets, is operationally very difficult, at least without an extraordinary investment of resources and maybe not even then," according to the government statement.
It's not possible, for example, to determine whether a person who receives an email is a U.S. person, as the email address does not reveal anything about the citizenship or nationality of the person, it said. In cases where it is possible to get information that would help to determine if the person is from the U.S., the research required would "perversely require a greater invasion of that person's privacy than would otherwise occur."
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- 5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce
- Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
- Regain control and reduce risk without sacrificing business productivity and growth
- IDC MarketScape: Worldwide Client Virtualization Software 2013 Vendor Assessment
- IDC has placed Citrix in the 2013 IDC MarketScape Leaders Category once again noting that, "Citrix's position reflects the company's market leadership and...
- Infographic: Top Use Cases for Desktop Virtualization
- A wide range of business issues is driving IT toward desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their entire... All Government IT White Papers
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- All Government IT Webcasts