Costs of NSA phone records collection program outweigh the benefits
The agency's metadata collection efforts haven't been key to thwarting terrorist attacks, researchers say
Computerworld - The National Security Agency (NSA) has often claimed that its data collection programs have helped thwart dozens of terrorist plots in the U.S. But an analysis of one such program, the NSA's controversial bulk telephone records collection initiative, suggests that the cost of running and maintaining the effort may far outweigh any benefits.
The analysis, conducted by John Mueller, an adjunct professor in the department of political science at Ohio State University, and Mark Stewart, a professor at the University of Newcastle in Australia, is based on published reports, court records and publicly released government data.
It considers the NSA's claimed successes in foiling terrorist plots with the costs that must have been incurred to stop any attacks.
The NSA has said that its surveillance efforts helped it disrupt 54 terrorism plots in the U.S. over the past several years.
The authors note that the overall number by itself is very small considering the tens of billions of dollars that must have been spent on counterterrorism programs established after the terrorist attacks of Sept. 11, 2001. The number becomes even smaller when only the bulk phone metadata collection program is considered.
According to Mueller and Stewart, a review of publicly available information shows that about 90% of the cases cited as successes by the NSA actually involved data gathered under PRISM, a separate program designed to gather information on non-U.S. terror suspects.
That means that the metadata program played a role in about five cases since it was launched. Of those cases, only one appears to have been a truly serious threat -- three Afghan-Americans were plotting to set off bombs in the United States, according to Mueller and Stewart. Even in that case, at least some of the information used to help thwart the plot came from other data collection programs.
In fact, just one of the identified cases relied on phone metadata in a major way; it involved a San Diego cab driver who was later convicted of sending money to a terrorist group in Somalia.
Neither the NSA nor the Obama Administration has so far publicly disclosed the costs of running the various data surveillance programs. The authors of the report surmise that government officials may not even know what the programs cost. Spending increases on counterterrorism in the aftermath of 9/11 attacks took place so fast that few kept track of it.
It is possible that the direct costs of maintaining the metadata collection program are quite low, the authors noted in their report. Even so, a full accounting should include not just the collection and storing of the data but also the costs of searching through and analyzing the data and developing and following through on leads.
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!