Costs of NSA phone records collection program outweigh the benefits
The agency's metadata collection efforts haven't been key to thwarting terrorist attacks, researchers say
Computerworld - The National Security Agency (NSA) has often claimed that its data collection programs have helped thwart dozens of terrorist plots in the U.S. But an analysis of one such program, the NSA's controversial bulk telephone records collection initiative, suggests that the cost of running and maintaining the effort may far outweigh any benefits.
The analysis, conducted by John Mueller, an adjunct professor in the department of political science at Ohio State University, and Mark Stewart, a professor at the University of Newcastle in Australia, is based on published reports, court records and publicly released government data.
It considers the NSA's claimed successes in foiling terrorist plots with the costs that must have been incurred to stop any attacks.
The NSA has said that its surveillance efforts helped it disrupt 54 terrorism plots in the U.S. over the past several years.
The authors note that the overall number by itself is very small considering the tens of billions of dollars that must have been spent on counterterrorism programs established after the terrorist attacks of Sept. 11, 2001. The number becomes even smaller when only the bulk phone metadata collection program is considered.
According to Mueller and Stewart, a review of publicly available information shows that about 90% of the cases cited as successes by the NSA actually involved data gathered under PRISM, a separate program designed to gather information on non-U.S. terror suspects.
That means that the metadata program played a role in about five cases since it was launched. Of those cases, only one appears to have been a truly serious threat -- three Afghan-Americans were plotting to set off bombs in the United States, according to Mueller and Stewart. Even in that case, at least some of the information used to help thwart the plot came from other data collection programs.
In fact, just one of the identified cases relied on phone metadata in a major way; it involved a San Diego cab driver who was later convicted of sending money to a terrorist group in Somalia.
Neither the NSA nor the Obama Administration has so far publicly disclosed the costs of running the various data surveillance programs. The authors of the report surmise that government officials may not even know what the programs cost. Spending increases on counterterrorism in the aftermath of 9/11 attacks took place so fast that few kept track of it.
It is possible that the direct costs of maintaining the metadata collection program are quite low, the authors noted in their report. Even so, a full accounting should include not just the collection and storing of the data but also the costs of searching through and analyzing the data and developing and following through on leads.
- Combating Identity Theft in a Mobile, Social World Offering identity theft protection and remediation allows businesses to give their workforce the confidence to efficiently engage while bringing financial reward to the...
- After a Breach: Managing Identity Theft Effectively This white paper from LifeLock Business Solutions notes that FIs in addition to managing fraud should strive to turn a negative event for...
- Combating Identity Fraud in a Virtual World This slide presentation reveals findings from the Javelin Strategy & Research 2012 Identity Fraud Report about mobile and social trends, the real risks...
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Accelerate your innovation with IBM Bluemix™ Join us for a webcast introducing the new IBM BluemixTM. IBM Bluemix (www.bluemix.net) is a developer oriented Platform as a Service (PaaS) environment... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!