Costs of NSA phone records collection program outweigh the benefits
Leads from the NSA metadata collection program are handed to the FBI, which then has to follow through and investigate them at additional cost. Public reports and disclosures in the media and by government officials suggest that many of the leads supplied by the NSA end up going nowhere. In fact, only 0.2% of the leads typically pan out enough for the FBI to follow through, the authors wrote.
The NSA's intense focus on "connecting the dots" over the past few years has led it to collect and analyze a vast amount of mostly useless information, according to Mueller and Stewart. Bits of data that ordinarily wouldn't have merited a second glance previously, are now collected, filed and analyzed at potentially great cost.
"There is very little evidence that any of this has done much good," Mueller said Friday. "The costs certainly outweigh the benefits, especially if you include things like privacy costs and opportunity costs," he said.
According to Mueller, even if the metadata program was to result in the NSA thwarting just one major terrorist attack every four years, it would still not be cost effective when all costs are accounted for.
Noted security researcher Bruce Schneier said the analysis of the value of the metadata program appears solid. "I think they have great framework for analysis, and -- given the information we have -- have demonstrated that [the data collection program] doesn't have value," he said
"Of course, it's possible that the NSA has secret information that proves that it does have value. But given that the NSA has been pretty desperate to show that they're actually keeping us secure, it's pretty safe to conclude that if they did have evidence they would have presented it," he said.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Privacy in Computerworld's Privacy Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Privacy White Papers | Webcasts