Costs of NSA phone records collection program outweigh the benefits
The agency's metadata collection efforts haven't been key to thwarting terrorist attacks, researchers say
Computerworld - The National Security Agency (NSA) has often claimed that its data collection programs have helped thwart dozens of terrorist plots in the U.S. But an analysis of one such program, the NSA's controversial bulk telephone records collection initiative, suggests that the cost of running and maintaining the effort may far outweigh any benefits.
The analysis, conducted by John Mueller, an adjunct professor in the department of political science at Ohio State University, and Mark Stewart, a professor at the University of Newcastle in Australia, is based on published reports, court records and publicly released government data.
It considers the NSA's claimed successes in foiling terrorist plots with the costs that must have been incurred to stop any attacks.
The NSA has said that its surveillance efforts helped it disrupt 54 terrorism plots in the U.S. over the past several years.
The authors note that the overall number by itself is very small considering the tens of billions of dollars that must have been spent on counterterrorism programs established after the terrorist attacks of Sept. 11, 2001. The number becomes even smaller when only the bulk phone metadata collection program is considered.
According to Mueller and Stewart, a review of publicly available information shows that about 90% of the cases cited as successes by the NSA actually involved data gathered under PRISM, a separate program designed to gather information on non-U.S. terror suspects.
That means that the metadata program played a role in about five cases since it was launched. Of those cases, only one appears to have been a truly serious threat -- three Afghan-Americans were plotting to set off bombs in the United States, according to Mueller and Stewart. Even in that case, at least some of the information used to help thwart the plot came from other data collection programs.
In fact, just one of the identified cases relied on phone metadata in a major way; it involved a San Diego cab driver who was later convicted of sending money to a terrorist group in Somalia.
Neither the NSA nor the Obama Administration has so far publicly disclosed the costs of running the various data surveillance programs. The authors of the report surmise that government officials may not even know what the programs cost. Spending increases on counterterrorism in the aftermath of 9/11 attacks took place so fast that few kept track of it.
It is possible that the direct costs of maintaining the metadata collection program are quite low, the authors noted in their report. Even so, a full accounting should include not just the collection and storing of the data but also the costs of searching through and analyzing the data and developing and following through on leads.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Accelerating Network Convergence in Virtualized and Cloud Data Centers Adopting a converged networking strategy enables organizations to traffic server and storage I/O workloads on consolidated data throughput channels. Intelligent software helps optimize...
- Omnichannel: From Buzzword to Strategy Customers demand a seamless experience across channels, especially mobile. Read this whitepaper for a research-based framework for using omnichannel for higher customer engagement.
- How 10GbE Network is the Backbone of the Virtual Data Center The shift to a virtual data center has put tremendous strain on legacy networks; driving the need for more speed, lower latency, more...
- 10GbE in the Data Center Improvements in 10GbE technology, lower pricing, and improved performance make 10GbE for the mid-market a viable and cost-effective strategy. This white paper discusses...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have. All Privacy White Papers | Webcasts