Groklaw shutdown shows 'chilling effect' of NSA surveillance

The privacy concerns that led Groklaw founder Pamela Jones to shutter the award-winning legal news site are understandable given the breadth of U.S. government surveillance of Internet communications, experts say.

In closing the website on Tuesday, Jones made her last post on the blog a heartfelt goodbye that followed a couple of weeks of soul searching.

"The simple truth is, no matter how good the motives might be for collecting and screening everything we say to one another, and no matter how 'clean' we all are ourselves from the standpoint of the screeners, I don't know how to function in such an atmosphere," Jones wrote. "I don't know how to do Groklaw like this."

Jones's dramatic action followed revelations in June that the National Security Agencym (NSA) was collecting massive amounts of data from telecommunication and Internet companies. Leaked to the media by former NSA contractor Edward Snowden, the disclosure has sparked a national debate on whether the scope of the surveillance goes far beyond what the government claims it needs to fight terrorism.

After weighing the facts and arguments, Jones decided that the broadness of the snooping compromised privacy to the extent that she was no longer comfortable communicating with readers in and outside of the U.S. Most communications is through email.

"My personal decision is to get off of the Internet to the degree it's possible," she said.

Groklaw is not the first business to go dark because of NSA-related privacy concerns. U.S.-based encrypted email services Lavabit and Silent Circle were shut down after the owners determined they could not provide the level of secrecy their clients demanded.

[Also see: Why we can't stop malicious insiders |Ã'Â NSA revelations a mixed bag for private clouds | Cloud market destined to change following NSA leaks |Ã'Â U.S. openness, restraint could lessen fallout from NSA surveillanceÃ'Â |Ã'Â Ã'Â NSA snooping bolsters opponents of U.S. Internet controlÃ'Â |Ã'Â Privacy groups, some lawmakers rip into NSA surveillanceÃ'Â |Ã'Â U.S. intelligence chief defends surveillance programsÃ'Â |Ã'Â Verizon, others have no choice but to hand over customer data]

Julian Sanchez, who focuses on the intersection of technology and privacy as a research fellow at the Cato Institute, said Jones' conclusion "could very well be legitimate," depending on the email discussions.

"If the site's sources are engaged in confidential legal communications, they could very well have valid concerns about the security of those exchanges," Sanchez said.

The closing of Groklaw, Lavabit and Silent Circle demonstrate the "chilling effect" NSA surveillance is having on organizations, said Rob Banagale, chief executive and co-founder of Gliph, which provides encrypted text and picture messaging.

"Pamela's concerns were personal, and I too have felt a chilling effect of sharing information via email since the revelation of U.S. surveillance programs," Banagale said.

However, Peter Ludlow, a professor at Northwestern University who has written extensively about U.S. intelligence work, said Jones was giving up too easily. Instead, she should adopt other practices to bolster the privacy of sources.

"It's true that no privacy-securing system is perfect, but this isn't a perfect world," Ludlow said. "Giving up just hands the surveillance state a reward for its tactics. That can't be allowed to happen."

Efforts to curb government surveillance include lawsuits filled against the NSA by privacy advocates, including the Electronic Frontier Foundation, the American Civil Liberties Union and the Electronic Privacy Information Center (EPIC). In addition, numerous reform bills have been introduced in Congress.

"Progress is being made, but it's too early to tell what the final result will be," said David Jacobs, consumer protection counsel at EPIC.

Read more about data privacy in CSOonline's Data Privacy section.

Join the CSO newsletter!

Error: Please check your email address.

Tags applicationsgroklawGliphnsaLavabitsoftwaredata protectionData Protection | Data Privacygovernment surveillanceSilent Circle

More about Cato InstituteElectronic Frontier FoundationElectronic Privacy Information CenterNSAVerizonVerizon

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts