Tip of the Hat: Are advocates unfairly piling on Google for NSA emails?
Forbes' Woollacott says leaked emails don't prove Google 'was all that tight with the NSA'
Computerworld - Since Al Jazeera America posted copies of emails between Google executives and National Security Agency officials on Tuesday, online criticism of the the Internet firm has spread quickly.
Privacy advocates say the email exchanges between NSA director General Keith Alexander and Google executives Eric Schmidt and Sergey Brin suggest a closer-than-previously-thought relationship between the three, and some close cooperation on efforts to access personal data.
The emails were dated before Edward Snowden released stolen classified documents last year that revealed the NSA spy program was far more expansive than previously thought, and before Schmidt blasted the agency for violating the privacy of Americans.
But, notes Forbes contributor Emma Woollacott, there's not nearly enough information in the missives to conclude that Google worked with the NSA to gather personal information on Americans.
Woollacott gets a Tip of the Hat from Computerworld for providing a counterpoint in her evenhanded story, Why Shouldn't Google Discuss Security With The NSA?. As she notes, "Given that the email exchanges took place months *before* the revelation that Google's communications were being tapped - which the company claims it didn't know - there's no earthly reason why it shouldn't take part in a national security initiative."
Until and unless more information emerges, she notes, it's hard to blame Google for helping the NSA violate privacy rights.
Read more about Privacy in Computerworld's Privacy Topic Center.
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Magic Quadrant for Data Masking Technology IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Read the full report to learn about IBM.
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!