U.S. surveillance disclosure mostly useless to business

Businesses will find very little value in the government's first annual report on surveillance activities, experts say.

The Office of the Director of National Intelligence (ODNI) disclosed last Friday that the government collected in 2013 information on more than 89,000 "targets" and issued more than 19,000 National Security Letters (NSLs).

[U.S. government seeking easier hacking sparks privacy debate]

An NSL, issued by the FBI, represents the most secretive type of investigation, since the letters demand customer information from companies while also activating a gag order that prohibits the recipients from disclosing what they did in responding to the NSL.

The lack of context in the government disclosure makes the numbers useless in determining the extent of government surveillance involving Americans or U.S. businesses.

The ODNI acknowledges that the term "targets," as defined by Section 702 of the Foreign Intelligence Surveillance Act (FISA), is broad and could mean a particular person, a group or organization.

"Public reporting, generally, is a valuable oversight mechanism, but these particular reports really do not offer much useful information," Ginger McCall, director of the Open Government Project of the Electronic Privacy Information Center (EPIC), said Monday.

Mark Rumold, staff attorney for the Electronic Frontier Foundation, said, the report was simply "more information."

"If anyone was laboring under the impression that the government's 702 surveillance was narrowly cabined or limited to a few thousand people, then this disclosure puts that question to rest."

The number of targets at 89,138 is the "floor" for the number of actual individuals affected, Rumold said. "The ceiling could be 10 times higher, it could be 100 times higher. There's is no telling."

The ODNI released the numbers in complying with a directive from President Barack Obama. The order instructed the ODNI to declassify and release as much information as possible on the government's data collection.

The directive followed revelations of the U.S. National Security Agency gathering massive amounts of information on Internet activity, such as email and text messaging, as well as mobile phone communications. NSA activity was exposed through documents released to the media by former agency contractor Edward Snowden.

[NSA hacked into servers at Huawei headquarters, reports say]

The disclosures have had a major impact on tech companies selling products in foreign markets. Cisco has publicly stated that sales have suffered, because of the reports on NSA spying.

In addition, eight of the largest U.S. Internet companies, including Facebook, Google and Microsoft, have formally urged the White House and Congress to rein in NSA activity.

Join the CSO newsletter!

Error: Please check your email address.

Tags Government surveillance NSAgovernment cybersecurityapplicationsgovernment monitoringgovernment agenciesnsa surveillance programsoftwareNSA SurveillanceDirector of National Intelligencefbidata protectiongovernment surveillanceNSA cybersecurity activities

More about CiscoElectronic Frontier FoundationElectronic Privacy Information CenterFacebookFBIGoogleHuaweiMicrosoftNational Security AgencyNSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts