The document discusses how recent NSA surveillance program revelations have negatively impacted the technology industry and cloud computing. It summarizes that the NSA collected data from major tech companies without consent, details some of their surveillance programs, and reviews the legal and economic fallout, including two conflicting court rulings on the programs' constitutionality. Recent estimates suggest the NSA actions could cost the US tech industry between $35-180 billion over the next three years due to lost foreign business and erosion of trust in US cloud services.
Warrantless governmental surveillance through the use of emerging technology ...Vania_Chaker
Abstract: Warrantless Governmental Surveillance through the Use of Emerging Technology Has Become a Mainstay of Governmental Investigation
The United States government enjoys awesome technological capabilities. It can facilely monitor electronic communications and surreptitiously retrieve stored information on private computer systems through the use of emerging technology. Indeed, technology that was once the stuff of science fiction is now routinely used in real life to monitor the activities of citizens, corporations, even foreign nationals in foreign nations.
This blog post raises the question as to whether such powerful governmental capabilities have been tempered by the countervailing protective judicial or legislative safeguards necessary to offset the greatly increased potential for improper government intrusiveness. The word count is 449 words (1,396 words including footnotes).
Anger swells after NSA phone records collection revelationstrupassion
The scale of America's surveillance state was laid bare on Thursday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years.
After the revelation by the Guardian of a sweeping secret court order that authorised the FBI to seize all call records from a subsidiary of Verizon, the Obama administration sought to defuse mounting anger over what critics described as the broadest surveillance ruling ever issued.
Warrantless governmental surveillance through the use of emerging technology ...Vania_Chaker
Abstract: Warrantless Governmental Surveillance through the Use of Emerging Technology Has Become a Mainstay of Governmental Investigation
The United States government enjoys awesome technological capabilities. It can facilely monitor electronic communications and surreptitiously retrieve stored information on private computer systems through the use of emerging technology. Indeed, technology that was once the stuff of science fiction is now routinely used in real life to monitor the activities of citizens, corporations, even foreign nationals in foreign nations.
This blog post raises the question as to whether such powerful governmental capabilities have been tempered by the countervailing protective judicial or legislative safeguards necessary to offset the greatly increased potential for improper government intrusiveness. The word count is 449 words (1,396 words including footnotes).
Anger swells after NSA phone records collection revelationstrupassion
The scale of America's surveillance state was laid bare on Thursday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years.
After the revelation by the Guardian of a sweeping secret court order that authorised the FBI to seize all call records from a subsidiary of Verizon, the Obama administration sought to defuse mounting anger over what critics described as the broadest surveillance ruling ever issued.
US mining data from 9 leading internet firms and companies deny knowledgetrupassion
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track one target or trace a whole network of associates, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.
House rejects nsa spying restrictions after white house outcryWorld Truth
The US House of Representatives voted on Wednesday to reject an attempt to reign in domestic spying by the National Security Agency following a storm of lobbying by the White House against the measure.
In a 205-217 vote the House defeated an amendment introduced by Rep. Justin Amash (R-Michigan) which would have prevented the NSA from collecting the phone data of individuals not currently under investigation.
Obama administration defends massive phone record collectiontrupassion
The Obama administration on Thursday defended its collection of the telephone records of millions of Americans as part of U.S. counter terrorism efforts, re-igniting a fierce debate over privacy even as it called the program critical to warding off an attack.
The admission came after Britain's Guardian newspaper published on Wednesday a secret court order authorizing the collection of phone records generated by millions of Verizon Communications(VZ.N) customers.
Privacy advocates blasted the order as unconstitutional government surveillance and called for a review of the program amid renewed concerns about intelligence-gathering efforts launched after the September 11, 2001, attacks on the United States.
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
Cyber terrorists are sophisticated, organized and disruptive to your business. How prepared are you? Explore the landscape of malicious actors most likely to strike your business and what you can do about it.
Præsentation for PROSA listing some threat and how to reduce risk - open source oyu can reuse slides for your own presentations https://github.com/kramshoej/security-courses
US mining data from 9 leading internet firms and companies deny knowledgetrupassion
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track one target or trace a whole network of associates, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.
House rejects nsa spying restrictions after white house outcryWorld Truth
The US House of Representatives voted on Wednesday to reject an attempt to reign in domestic spying by the National Security Agency following a storm of lobbying by the White House against the measure.
In a 205-217 vote the House defeated an amendment introduced by Rep. Justin Amash (R-Michigan) which would have prevented the NSA from collecting the phone data of individuals not currently under investigation.
Obama administration defends massive phone record collectiontrupassion
The Obama administration on Thursday defended its collection of the telephone records of millions of Americans as part of U.S. counter terrorism efforts, re-igniting a fierce debate over privacy even as it called the program critical to warding off an attack.
The admission came after Britain's Guardian newspaper published on Wednesday a secret court order authorizing the collection of phone records generated by millions of Verizon Communications(VZ.N) customers.
Privacy advocates blasted the order as unconstitutional government surveillance and called for a review of the program amid renewed concerns about intelligence-gathering efforts launched after the September 11, 2001, attacks on the United States.
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
Cyber terrorists are sophisticated, organized and disruptive to your business. How prepared are you? Explore the landscape of malicious actors most likely to strike your business and what you can do about it.
Præsentation for PROSA listing some threat and how to reduce risk - open source oyu can reuse slides for your own presentations https://github.com/kramshoej/security-courses
Krempley 1
POL 300
Google/Multi-National Corporations, International Surveillance, and Human Rights
Abstract
The many news reports on cyber security, identity theft, Wikileaks, and NSA intelligence gathering programs over the past few years have shown the international community that the World Wide Web is anything but a safe place to store sensitive information, or any information for that matter. This study will examine how closely multi-national corporations in the information technology sector, such as Google, are involved with national governments on these issues. The study will analyze events in the U.S. and China and attempt to uncover whether or not these have directly infringed upon peoples’ basic human rights.
Question
With emerging information regarding the NSA's PRISM program and China's "Golden Shield Project", has either country directly infringed on peoples' basic human rights?
Hypothesis
As more information is uncovered regarding the true nature of the aims of these internationally implemented programs, it has become increasingly clear that there have been multiple violations of peoples' human rights in both the United States and China with their respective monitoring programs.
The NSA and the PRISM Project
"Since September 11th, 2001, the United States government has dramatically increased the ability of its intelligence agencies to collect and investigate information on both foreign subjects and US citizens. Some of these surveillance programs, including a secret program called PRISM, capture the private data of citizens who are not suspected of any connection to terrorism or any wrongdoing." (Sottek&Kopstein, 2013) Under the guise of a "war on terror", the United States government has consistently upped its efforts to gather as much information as possible regarding the activities of international and domestic citizens alike. Most U.S. citizens were wholly unaware that the government had been running a secret filtration program to determine threat levels of individual citizens both domestically and abroad. This PRISM project and its intentions have recently been leaked in the Edward Snowden fiasco that took the country and the media by storm.
"PRISM is a tool used by the US National Security Agency (NSA) to collect private electronic data belonging to users of major internet services like Gmail, Facebook, Outlook, and others. It’s the latest evolution of the US government’s post-9/11 electronic surveillance efforts, which began under President Bush with the Patriot Act, and expanded to include the Foreign Intelligence Surveillance Act (FISA) enacted in 2006 and 2007." (Sottek&Kopstein, 2013) FISA, "...may be the most powerful court you have never heard of -- operating out of a bunker-like complex blocks from the Capitol and the White House -- sealed tightly to prevent eavesdropping.The FISA Court's larger mission is to decide whether to grant certain types of government requests-- wiretapping, data anal ...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Can cloud computing survive the NSA disclosuresJason Fernandes
Over the past several months, the disclosures by former National Security Agency (NSA) contractor Edward Snowden have hit internet companies hard. Lately, there has been a steady migration to the cloud services. People were increasingly comfortable with storing important documents online. The NSA disclosures have stopped this trend in its tracks, and could possibly lead to its reversal.
Intelligence chief defends internet spying programabiross34
WASHINGTON (AP) — Eager to quell a domestic furor over U.S. spying, the nation’s top intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot intentionally target a U.S. citizen. He decried the revelation of that and another intelligence-gathering program as reckless.
For the second time in three days, Director of National Intelligence James Clapper took the rare step of declassifying some details of an intelligence program to respond to media reports about counterterrorism techniques employed by the government.
‘‘Disclosing information about the specific methods the government uses to collect communications can obviously give our enemies a ‘playbook’ of how to avoid detection,’’ he said in a statement.
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxLeonardN9WWelchw
Government Employs Backdoor Searches ACSB standards: Social and Ethical Issues, Technology in Society he Central Intelligence Agency (CIA) conducts foreign covert operations, counterintelligence operations, and collects and analyzes foreign intelligence for the president and his staff to aid in national ecurity decisions. The National Security Agency (NSA) is responsible for global monitoring, collection, and processing of information for foreign intelligence and counterintelligence purposes. The Federal sureau of Investigation ( FBI ) conducts domestic counterintelligence and counterterrorism operations in addition to its role as the lead law enforcement agency in the country. hese three agencies have implemented sophisticated programs to capture, store, and analyze electronic communications. The Downstream program (formerly called PRISM) extracts data from the ervers of nine major American Intemet companies including AOL, Apple, Facebook, Google, Microsof, Paltalk, Skype, Yahoo, and YouTube to obtain direct access to audio, video, photographs, emails, ocuments, and connection logs for each of these systems. The Upstream program taps into the infrastructure of the Internet to capture the online communications of foreigners outside the United States ulile their communications are in transit. The leaders of the intelligence agencies argue that these programs are essential to fighting terrorism. The agencies can also provide a dozen or more examples of ow use of the data gathered by these programs has thwarted the efforts of terrorists around the world. he programs are authorized by Section 702 of the FISA Amendments Act which authorizes surveillance of any foreigner overgeas, provided the purpose is to obtain "foreign intelligence " The Act loosely efines "foreign intelligence" to mean any information that "relates to" the conduct of foreign affairs. This broad definition mears that the target being survelled need not be a terrorist. The target needs only be thought to have information that is relevant to the government's foreign intelligence objective-whatever that may be. he process of gathering foreign electronic communications necessarily means the incidental capture of many conversations involving an American (who may be here in the United States) and a foreign arget. They may well be having a totally innocent communication with a foreign triend, relative, or business partner who is not suspected of any wrongdoing whatsoever. The total number of Americans' ommunications "incidentally" collected since the inception of Section 702 is well into the millions. fection 702 also allows the government to pool all the messages it intercepts into a giant database and then search the database, including conversations involving Americans - without a warrant. Varrantless survelliance of communications between Americans and foreigners is known as a "backdoor search because it effectively evades other provisions of United States law that require an ndiv.
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
In Singapore, the Government launched an app using short-distance Bluetooth signals to connect one phone using the app with another user who is close by. It stores detailed records on a user's phone for 21 days decrypt the data if there is a public health risk related to an individual's movements.
China used a similar method to track a person's health status and to control movement in cities with high numbers of coronavirus cases. Individuals had to use the app and share their status to be able to access public transportation.
The keys to addressing privacy concerns about high-tech surveillance by the state is de-identifying the data and giving individuals control over their own data. Personal details that may reveal your identity such as a user's name should not be collected or should be protected with access to be granted for only specific health purposes, and data should be deleted after its specific use is no longer needed.
We will discuss how to protect privacy sensitive data that is collected to control the coronavirus outbreak.
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxronak56
Review DNI WTA's for 2015 and 2016 (see attached). Compare and contrast all the threat[s] as the DNI saw them last year and what he sees this year? This is more than just a list.
* You may group ‘threats’ for simplicity.
* If you don’t understand how to compare and contrast – ask me.
Why the change? [Assume what’s addressed first is first priority and what’s addressed last is last].
Instructions: Your initial post should be at least 350 words.
Statement for the Record
Worldwide Threat Assessment
of the
US Intelligence Community
Senate Armed Services Committee
James R. Clapper
Director of National Intelligence
February 9, 2016
i
STATEMENT FOR THE RECORD
WORLDWIDE THREAT ASSESSMENT
of the
US INTELLIGENCE COMMUNITY
February 9, 2016
INTRODUCTION
Chairman McCain, Vice Chairman Reed, Members of the Committee, thank you for the invitation to offer
the United States Intelligence Community’s 2016 assessment of threats to US national security. My
statement reflects the collective insights of the Intelligence Community’s extraordinary men and women,
whom I am privileged and honored to lead. We in the Intelligence Community are committed every day to
provide the nuanced, multidisciplinary intelligence that policymakers, warfighters, and domestic law
enforcement personnel need to protect American lives and America’s interests anywhere in the world.
The order of the topics presented in this statement does not necessarily indicate the relative importance
or magnitude of the threat in the view of the Intelligence Community.
Information available as of February 3, 2016 was used in the preparation of this assessment.
ii
TABLE OF CONTENTS
Page
GLOBAL THREATS
Cyber and Technology
Terrorism
Weapons of Mass Destruction and Proliferation
Space and Counterspace
Counterintelligence
Transnational Organized Crime
Economics and Natural Resources
Human Security
1
4
6
9
10
11
12
13
REGIONAL THREATS
East Asia
China
Southeast Asia
North Korea
Russia and Eurasia
Russia
Ukraine, Belarus, and Moldova
The Caucasus and Central Asia
Europe
Key Partners
The Balkans
Turkey
Middle East and North Africa
Iraq
Syria
Libya
Yemen
Iran
16
16
17
17
17
17
19
19
20
20
20
21
21
21
22
23
23
24
iii
Lebanon
Egypt
Tunisia
25
25
25
South Asia
Afghanistan
Bangladesh
Pakistan and India
Sub-Saharan Africa
Central Africa
Somalia
South Sudan
Sudan
Nigeria
26
26
27
27
27
27
28
28
28
28
Latin America and Caribbean
Central America
Cuba
Venezuela
Brazil
28
28
29
29
29
1
GLOBAL THREATS
CYBER AND TECHNOLOGY
Strategic Outlook
The consequences of innovation and increased reliance on information technology in the next few years
on both our society’s way of life in general and h ...
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
www.pwc.com/gsiss2015
Managing cyber risks in an
interconnected world
Key findings from The Global State of
Information Security® Survey 2015
30 September 2014
03
Employees are the most-
cited culprits of incidents
p13
Nation-states, hackers, and
organized crime groups are
the cybersecurity villains that
everybody loves to hate
Figure 6: Insiders vs. outsiders
p15
High growth in high-profile
crimes
p18
Domestic intelligence: A new
source of concern
01
Cyber risks: A severe and
present danger
p1
Cybersecurity is now a persistent
business risk
p3
And the risks go beyond devices
p5
Cybersecurity services market
is expanding
Figure 1: Security incidents outpace
GDP and mobile phone growth
Table of contents
02
Incidents and financial
impacts continue to soar
p7
Continued year-over-year
rise is no surprise
Figure 2: Security incidents grow
66% CAGR
Figure 3: Larger companies detect
more incidents
Figure 4: Information security
budget by company size (revenue)
p10
Financial losses increase apace
Figure 5: Incidents are more costly
to large organizations
07
Evolving from security to
cyber risk management
p31
As incidents continue to proliferate
across the globe, it’s becoming
clear that cyber risks will never
be completely eliminated
p35
Methodology
p36
Endnotes & sources
p37
Contacts by region
04
As incidents rise, security
spending falls
p19
Organizations are undoubtedly
worried about the rising tide
of cybercrime
Figure 7: Overall, average security
budgets decrease slightly, reversing
a three-year trend.
Figure 8: Top spending priorities
over the next 12 months
05
Declines in fundamental
security practices
p25
Security practices must keep pace
with constantly evolving threats
and security requirements
Figure 9: Failing to keep up with
security threats
Figure 10: At most organizations, the
Board of Directors does not participate
in key information security activities
06
Gains in select security
initiatives
p29
While we found declines in
some security practices, we also
saw gains in important areas
Cybersecurity is
now a persistent
business risk
It is no longer an issue that
concerns only information
technology and security
professionals; the impact
has extended to the C-suite
and boardroom.
Awareness and concern about
security incidents and threats
also has become top of mind among
consumers as well. In short, few
risk issues are as all-encompassing
as cybersecurity.
Media reports of security incidents
have become as commonplace as the
weather forecast, and over the past
12 months virtually every industry
sector across the globe has been hit
by some type of cyber threat.
Following are but a few: As incidents
proliferate, governments are
becoming more proactive in helping
organizations fight cyber crime.
The US Federal Bureau of
Investigation (FBI), for example,
disclosed that it notified 3,000
companies—including banks,
retaile.
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
An overview of the legal, privacy, and security issues surrounding modern cloud services and cryptography
Created as an alumnus talk for the Computer & Network Support Technology Fairfield Career Center senior class of 2016.
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
ESSENTIALS OF
Management Information Systems 12e
KENNETH C. LAUDON AND JANE P. LAUDON
continued
Systems
CHAPTER 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
CASE 3 Data Mining for Terrorists and Innocents
SUMMARY This case describes how data mining software, combined with Big Data collection from
the Internet, are used to identify potential terrorists. The PRISM program of the U.S.
National Security Agency (NSA) is an on-going effort to enable such Internet surveillance.
In some cases innocent people have been mistaken for terrorists, while sometimes a
terrorist plot is disrupted. The existence of the PRISM program was a national security
secret until its existence was revealed by Edward Snowden, a former NSA contractor.
There are two videos in this case:
(1) Data Mining for Terrorists and Innocents (L= 5:10)
URL http://www.youtube.com/watch?v=4lKpD7MC22I
(2) How Does the PRISM Program Work? (L=1:59)
URL https://www.youtube.com/watch?v=JR6YyYdF8ho
CASE Anti-terrorism agencies around the world have made effective use of new surveillance tech-
nologies that offer unprecedented abilities to identify and apprehend potential terrorists.
Today’s terrorists are by nature difficult to track, as disconnected groups of individuals can
use the Internet to communicate their plans with lower chance of detection. Anti-terrorist
technology has evolved to better handle this new type of threat.
But there are drawbacks to these new strategies. Often, innocent people may find their
privacy compromised or completely eliminated as a result of inaccurate information.
Surveillance technologies are constantly improving. While this makes it more difficult for
Chapter 4, Case 3 Data Mining for terrorists anD innoCents 2
continued
terrorists and other criminals to exchange information, it also jeopardizes our privacy, on
the Internet and elsewhere, going forward. For instance, it may be necessary to monitor the
phone calls of all American citizens, and visiting foreigners, in order to uncover a terrorist
plot. Is this reason for worry? Are comparisons to Orwell’s 1984 appropriate or overblown?
The first video displays both the positive and negative results of new advances in tech-
nology. The first segment describes a program called the Dark Web Project developed by
a team at the University of Tucson that combs the Internet in search of militant leaders
and their followers. The program creates profiles based on word length, punctuation,
syntax, and content, and displays information about the personality type of an individual
graphically.
The plotting of information on a graph represents whether the user is violent or militant,
inexperienced and seeking advice, or an opinion leader holding sway over many more
people. Programs like this have been adopted by many intelligence agencies worldwide,
who incorporate it into their arsenal of terrorist surveillance technologies.
It’s unclear if this project i.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
ESSENTIALS OF
Management Information Systems 12e
KENNETH C. LAUDON AND JANE P. LAUDON
continued
Systems
CHAPTER 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
CASE 3 Data Mining for Terrorists and Innocents
SUMMARY This case describes how data mining software, combined with Big Data collection from
the Internet, are used to identify potential terrorists. The PRISM program of the U.S.
National Security Agency (NSA) is an on-going effort to enable such Internet surveillance.
In some cases innocent people have been mistaken for terrorists, while sometimes a
terrorist plot is disrupted. The existence of the PRISM program was a national security
secret until its existence was revealed by Edward Snowden, a former NSA contractor.
There are two videos in this case:
(1) Data Mining for Terrorists and Innocents (L= 5:10)
URL http://www.youtube.com/watch?v=4lKpD7MC22I
(2) How Does the PRISM Program Work? (L=1:59)
URL https://www.youtube.com/watch?v=JR6YyYdF8ho
CASE Anti-terrorism agencies around the world have made effective use of new surveillance tech-
nologies that offer unprecedented abilities to identify and apprehend potential terrorists.
Today’s terrorists are by nature difficult to track, as disconnected groups of individuals can
use the Internet to communicate their plans with lower chance of detection. Anti-terrorist
technology has evolved to better handle this new type of threat.
But there are drawbacks to these new strategies. Often, innocent people may find their
privacy compromised or completely eliminated as a result of inaccurate information.
Surveillance technologies are constantly improving. While this makes it more difficult for
Chapter 4, Case 3 Data Mining for terrorists anD innoCents 2
continued
terrorists and other criminals to exchange information, it also jeopardizes our privacy, on
the Internet and elsewhere, going forward. For instance, it may be necessary to monitor the
phone calls of all American citizens, and visiting foreigners, in order to uncover a terrorist
plot. Is this reason for worry? Are comparisons to Orwell’s 1984 appropriate or overblown?
The first video displays both the positive and negative results of new advances in tech-
nology. The first segment describes a program called the Dark Web Project developed by
a team at the University of Tucson that combs the Internet in search of militant leaders
and their followers. The program creates profiles based on word length, punctuation,
syntax, and content, and displays information about the personality type of an individual
graphically.
The plotting of information on a graph represents whether the user is violent or militant,
inexperienced and seeking advice, or an opinion leader holding sway over many more
people. Programs like this have been adopted by many intelligence agencies worldwide,
who incorporate it into their arsenal of terrorist surveillance technologies.
It’s unclear if this project i ...
Looking Ahead Why 2019 Will Be The year of CyberwarfareSecuricon
One year away from the third decade of the 21st century and technology has finally caught up with science fiction. In 2019, we’re going to hear more news about driverless cars, revolutions in artificial intelligence and commercial applications for drones. One thing is for sure: it’s an exciting time to be alive.
1. HAS THE NSA POISONED
THE CLOUD?
Steven Titch
INTRODUCTION
T
he U.S. technology industry enters 2014 facing a
backlash to its perceived role as accomplice to a series
of National Security Agency surveillance programs,
each making extensive use of data mining to parse bil-
lions of consumer telephone, Internet and computer records
in what now appears to have been an ineffective effort to
track international terrorists.
Recent analysis projects the caution and mistrust engen-
dered by the NSA’s programs could cost U.S. technology
industry between $35 billion and $180 billion over the next
three years. Widespread NSA spying is unsettling because its
hits at the current focal point of communications and com-
puter innovation—cloud computing. Effective protection
of privacy and security is best managed by regulating the
activities of government, as opposed to the utility of Inter-
net services.
RECENT NSA SPYING REVELATIONS
PRISM, the NSA electronic surveillance program with the
most notoriety, was created in 2007, ostensibly under the
authorization of the Protect America Act and the Foreign
Intelligence Surveillance Act (FISA). Its activities have been
overseen by the FISA Court, an independent judicial arm set
up by FISA to determine persons and agencies who could be
targeted for surveillance.
The PRISM program remained secret until June 2013, when
news broke that the FISA Court had ordered Verizon Com-
munications to provide the NSA data on all customer tele-
phone calls on an ongoing daily basis.1
Days later, the Wash-
ington Post and the United Kingdom’s Guardian published
NSAdocumentsleakedtothembyEdwardSnowden,anNSA
contractor who claimed to have grown concerned over the
scope of the spying program.2
Snowden’s revelations revealed the NSA has been capturing
and mining massive amounts of private U.S. telecommuni-
cations and Internet traffic generated by ordinary citizens
in an attempt to gain intelligence primarily on international
terrorism, and that the program had further expanded to
support investigations into narcotics trafficking, the inter-
nal security of foreign countries and to obtain military and
political data on foreign countries, including U.S. allies.
Throughout the remainder of 2013, we learned that PRISM
was just one of several programs aimed at intercepting and
analyzing routine communications of not only of American
citizens, but foreign nationals, as well, ranging from ordinary
consumers to heads of state.
Some of the details of the NSA electronic spying include:
• Collecting “metadata” on millions of wireless
phone calls. Metadata describes information such as
the calling and called numbers, location of the callers,
R STREET POLICY STUDY NO. 17
January 2014
1. Glenn Greenwald, “NSA Collecting Phone Records of Millions of Verizon Customers
Daily – Top Secret Court Order Requiring Verizon to Hand Over All Call Data Shows
Scale of Domestic Surveillance under Obama,” The Guardian, June 5, 2013, available
at http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-
court-order.
2. Barton Gellman and Laura Poitras, “U.S., British intelligence mining data
from nine U.S. Internet companies in broad secret program,” The Washington
Post, June 7, 2012, available at http://www.washingtonpost.com/investigations/
us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-
program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html.
CONTENTS
Introduction 1
Recent NSA spying revelations 1
Legal, legislative and economic fallout 2
Implications for cloud computing 3
Industry backlash 4
Potential solutions 5
About the author 6
R STREET POLICY STUDY: 2014 HAS THE NSA POISONED THE CLOUD? 1
2. duration of the call, and other information pertaining
to the call other than the actual contents of the con-
versation.
• Monitoring emails and social media for “keywords”
that might signal terrorist or criminal activity. Among
other methods, the NSA tapped directly into private
networks owned by Google and Yahoo—an operation
dubbed MUSCULAR—reportedly without the knowl-
edge or consent of the companies.
• The development of algorithms designed to use the
Internet to connect to and gather information from
personal computers without knowledge of the users.
• Tapping phones of world leaders, such as German
Chancellor Angela Merkel, a U.S. ally.
• A plan to use the Internet to turn on embedded per-
sonal computer web cameras without user knowledge
or consent.
• A $10-million contract with RSA, a major supplier
of security software to Internet infrastructure manu-
facturers, to secretly install software on Internet rout-
ers and servers that could decode encrypted data.3
• The NSA’s Tailored Access Operations unit, which
developed a special computer code, known colloquially
to programmers as “back doors,” that defeat firewalls
designed to protect private data. The program target-
ed Internet infrastructure from major manufacturers
such as Cisco Systems, Juniper Networks, Huawai and
Dell.
The NSA used common Web advertising tracking programs,
called “cookies,” to follow user surfing habits and determine
whether they should be targeted for further hacking.
The data of a large number of U.S. companies – including
Microsoft, Google, Yahoo, Facebook and Apple – was used by
the PRISM program, sometimes with their knowledge and
consent, and sometimes without it.
The disclosures show no sign of letting up. As this paper
went to publication, reports emerged that the NSA, in a pro-
gram called Quantum, had implanted radio transmitters in
some 100,000 personal computers around the world. Using
radio, the NSA was able to access and spy on these PCs even
when they were not connected to the Internet.
LEGAL, LEGISLATIVE AND ECONOMIC FALLOUT
TheweightandscopeoftheNSAprogramshassparkedheat-
ed debate over their legality and constitutionality. Last year
closed with two conflicting court decisions on the constitu-
tionality of the PRISM program. On Dec. 16, 2013 in Wash-
ington D.C., Federal District Court Richard J. Leon ruled that
the NSA’s systematic recordkeeping of all Americans’ phone
calls most likely violated the Constitution. He ordered the
government to stop collecting data on two plaintiffs’ per-
sonal calls and to destroy the records of their calling history.4
Eleven days later, however, a federal judge in New York, Wil-
liam H. Pauley III, ruled the same data collection legal, set-
ting up an eventual appellate court battle.5
Congress’ 2014 session got underway with the introduction
of a bill from Rep. Adam Schiff, D-Calif., that would restruc-
ture the NSA’s phone metadata surveillance program. More
recently, on Jan. 17, President Barack Obama announced
steps to curtail the NSA’s surveillance programs, but stopped
well short of suspending them.
Obama announced the government would no longer main-
tain a database of millions of Americans’ telephone records,
which had been conducted under the auspices of Section 215
of the Patriot Act, but said telecommunications companies
or an independent third party could continue to maintain
that data, and did not rule out mandating that companies
do so. The president also said the White House would not
support the FISA Improvements Act, which would codify
into law the NSA’s authority to conduct many of its existing
surveillance programs, as well as endorsing creating a role
for independent advocates at the FISA court and conducting
an annual review of the court’s declassification decisions.
He also appointed John Podesta to lead a review of privacy
issues that affect non-suspects, called for a higher standard
for surveillance of foreign leaders and proposed ending per-
manent gag orders for National Security Letters
However, he did not call for an end to international surveil-
lance of Internet communications under Section 702 of the
FISA Amendments Act, nor did he rescind Executive Order
12333, which permits surveillance of overseas communica-
tions. He also did not take up the review panel’s recommen-
dation that National Security Letters only be issued after
judicial review, nor their recommendation against sabotag-
ing private encryption technology. While it remains to be
seen what legal and legislative remedies will be applied in
2014, there is already concern that the NSA programs will do
significant economic damage to the U.S. technology sector.
4. Charlie Savage, “Federal Judge Rules Against NSA Program,” The New York Times,
Dec. 16, 2013,
5. Adam Liptak and Michael S. Schmidt, “Judge Upholds N.S.A.’s Bulk Collection of
Data on Calls,” The New York Times, Dec. 27, 2013.
3. Joseph Menn, “Exclusive: Secret Contract Tied NSA and Security Industry Pioneer,”
Reuters, Dec. 20, 2013, available at http://www.reuters.com/article/2013/12/20/us-
usa-security-rsa-idUSBRE9BJ1C220131220.
R STREET POLICY STUDY: 2014 HAS THE NSA POISONED THE CLOUD? 2
3. The Information Technology and Innovation Foundation
(ITIF), a research institute that aims to promote public pol-
icies that advance technological innovation and productiv-
ity, estimates international concern and mistrust of U.S. tech
companies could cost the industry between $21.5 billion and
$35 billion through 2016. This is based on the assumption
that the industry loses 20 percent of its current foreign mar-
ket share, while retaining its projected domestic share.6
ITIF’spredictionsalreadymaybecomingtrue.CitingDefense
News, the Christian Science Monitor reported that the United
Arab Emirates may cancel a $926 million purchase of two
spy satellites from France unless two U.S.-made components
are removed from the product. Those components allegedly
contain digital “backdoors” that could allow unauthorized
access to data sent to the U.A.E.’s ground station.7
Elsewhere, John Henry Clippinger, ID3 executive director at
the Massachusetts Institute of Technology Media Lab, told
an interviewer: “What people do not appreciate is the eco-
nomic damage…that the NSA has done to the cloud comput-
ing business for the U.S.” He noted a number of European
banks no longer want to host data in the United States and
that Salesforce.com, which provides highly sensitive cloud-
based sales leads and customer information, has lost a major
client.8
Salesforce.com’s CEO has felt the need to publicly
state that it was not part of the PRISM program.9
It appears
the NSA’s aggressive surveillance has created an overall fear
among U.S. companies that there is “guilt by association”
from which they need to proactively distance themselves.
A more alarming figure comes from Forrester Research,
which provides analysis for financial firms and investors.
Forrester analyst James Staten cited the ITIF report, but
suggested its estimates are too conservative. Staten set
the potential global industry cost of PRISM at $180 billion
worldwide by 2016—the same time period ITIF uses. Staten
believes international buyers—particularly governments and
large corporations that are already sensitive to surveillance—
will be spooked enough by the NSA program that they will
throttle back their development of cloud computing technol-
ogy altogether.10
IMPLICATIONS FOR CLOUD COMPUTING
Although the term is literally nebulous to the layman, the
definition is quite simple. The “cloud” refers to the Internet
at large. Cloud computing refers to information processing
and storage done on the Internet, not on a home computer
or cellphone, as was standard until a few years ago. Cloud
computing makes it possible for users to, for example, access
playlists and movies from multiple devices, because that con-
tent is stored on servers in data centers that could be any-
where in the world.
That’s just one example. Services like Google’s Gmail and
Yahoo’s calendar are cloud-based, too. Social networks like
Facebook, LinkedIn, Instagram and Twitter use cloud com-
puting to deliver information across their billions of users.
Cloud computing has enable many users to now carry light-
weight tablets instead of bulky PCs.
Cloud computing is also the root of development for the
emerging generation of Web-based applications—home
security, outpatient care, mobile payment, distance learning,
efficient energy use and driverless cars. And it is a research
area where the United States is an undisputed leader.
Yet despite the excitement and innovation surrounding it,
cloud computing was raising privacy and security concerns
long before the revelations about the NSA program. The very
fact that personal information is stored and processed on
servers and computers belonging to third-parties, by defi-
nition, means some loss of user control. As companies like
Google and Facebook have grown, with revenue streams
derived partly from monetizing the information supplied by
users, debate in policy circles has intensified about privacy
protection.
Companies themselves have had to walk a fine line. While
the popularity of cloud-based services argues that consum-
ers are comfortable with trading a certain amount of per-
sonal information for the value of free access to many use-
ful applications, there have been instances when users have
pushed back. For example, Google blurred identifiable faces
and blacked out windows of homes that were photographed
for its Street View application, but not before international
complaints.11
Facebook has repeatedly modified and clarified
its privacy policies in response to user concerns.
10. James Staten, “The Cost of PRISM Will Be Higher Than ITIF Projects,” Forrester
Blogs, Forrester Research, Aug. 14, 2013, available at http://blogs.forrester.com/
james_staten/13-08-14-the_cost_of_prism_will_be_larger_than_itif_projects.
6. Daniel Castro, “How Much Will PRISM Cost the U.S. Cloud Computing Industry,”
ITIF, August 2013, p. 3.
7. Mark Clayton, “Five overlooked costs of the NSA surveillance flap,” Christian Sci-
ence Monitor, Jan. 12, 2014, available at http://www.csmonitor.com/layout/set/print/
World/Security-Watch/2014/0112/Five-overlooked-costs-of-the-NSA-surveillance-
flap.
8. VentureBeat (e-publication) video, “DataBeat 2013-John Henry Clippinger, Execu-
tive Director, ID3, MIT Media Labs, available at http://vimeo.com/81855881. Clippinger
makes his remarks starting at approximately 10:10.
9. Taylor Armerding, “NSA spying could mean US tech companies lose international
business,” Computerworld, June 19, 2013, available at http://www.computerworld.
co.nz/article/487899/nsa_spying_could_mean_us_tech_companies_lose_interna-
tional_business/
R STREET POLICY STUDY: 2014 HAS THE NSA POISONED THE CLOUD? 3
4. These and other cases where Internet companies may have
overreached, but then apologized and adjusted, reflect an
understanding that their continued success depends heav-
ily on consumer trust. Consumers hold them to their word
that personal information will be protected, and are poised
to punish those who break that trust.
Alas, this underlying trust could be a casualty of the NSA
spying program. While it has supplied late-night TV hosts
with plenty of fodder for jokes (“I finally got through to the
Obamacare helpline because, after two hours, the NSA got
tired of listening to that music they play while on hold”),
their humor derives from the uneasiness people now have
about how much the government is snooping on private
phone calls and emails. As a recent headline to another NSA
critique dourly put it, 2013 was “the year trust died.”12
This is why the degree of “brand damage” PRISM, MUSCU-
LAR and other NSA initiatives have inflicted on the U.S. tech-
nology industry may take longer to determine. People may be
less inclined to use social networks, or could opt for search
engines that are less thorough, but more private. For many
sites, this will mean a decline in visitors, which will have an
impact on revenues, profits and re-investment.
This is not to let some major players off the hook, how-
ever. PRISM did come under the jurisdiction of the FISA
Court, and third-party companies were obligated to com-
ply. However, there were instances where, in retrospect,
telephone companies could have used their legal resourc-
es to push back more aggressively. Verizon, after all, once
stood up to the Recording Industry Association of America
when it demanded the phone company provide the identi-
ties of account-holders the record companies believed were
involved in music piracy. Although the RIAA insisted it had
a right to the data, Verizon’s lawyers instructed the organi-
zation to seek court approval—a route which, in the end, the
RIAA did not choose.
In more recent years, the NSA demanded a huge amount of
data, not simply on suspected terrorists, but on millions of
customers who, perhaps for innocuous reasons, had talked
to persons who talked to persons who talked to a suspect.
For perspective, if Boston Marathon bombers Dzhokhar and
Tamerlan Tsarnaev bought coffee from a barista at Starbucks
the morning of their attack, it would be as if the government
then placed surveillance on every person who ever bought
coffee from that barista, as well as their friends and friends’
friends.Thephonecompanies’unprotestedcompliancewith
NSA directives puts some responsibility for the backlash at
their doorsteps. That RSA, a respected U.S. company in the
security space, so willingly agreed to compromise its own
customers for a government contract, is also disappointing.
Nonetheless, the public and the media do not seem to be in a
discerning mood, and the entire U.S. technology industry has
been tarred by what is being called “the Snowden effect.” Dis-
trust, suspicion and customer ill-will plague companies that
were unknowingly hacked by the NSA, as well as companies
like Saleforce.com and Amazon, who were never involved.
INDUSTRY BACKLASH
Much of the NSA’s surveillance was done without the knowl-
edge of tech companies it affected. Several programs, like
MUSCULAR and the Tailored Access Operation were undis-
guised attempts to undermine privacy and security protec-
tions these companies had put in place for consumers.
President Obama avoided discussion of these more inva-
sive NSA initiatives during his Jan. 17 address to the nation,
which focused largely on the PRISM program. PRISM was
much more sweeping than any of its predecessors, but at
least there is precedent for court-ordered wiretapping and
data collection. What makes many of the other NSA proj-
ects even more egregious is that they set out deliberately to
undermine security and privacy mechanisms that companies
put in place for their users. This is the high-tech equivalent
of breaking into someone’s home and prying open a locked
filing cabinet with a crowbar.
While there are laws that protect private citizens from such
burglary, there are none that offer explicit protection in the
cloud. The Electronic Communications Privacy Act (ECPA),
enacted in 1986, still reflects the technology of that era, and
mainly protects Americans against illegal wiretapping and
seizure of stored phone records. Because cloud computing
and storage did not exist in 1986, the act says nothing about
the protection of private information in the cloud.Many
judges have therefore interpreted seizure of any data stored
by third parties as not requiring consent or a search warrant.
The NSA has leveraged both jurisprudence and the lack of
specific law to push the limits as of its search and seizure
powers. President Obama, in his address, conceded there
was a “bias” within government to expand information-gath-
ering. The NSA’s activities provide clear examples.
Concern in U.S. technology circles is high enough that rivals
are unifying in demand for due process, transparency and
accountability for NSA surveillance. Bipartisan efforts to
strengthen ECPA are gaining momentum. Another effort,
“Reform Government Surveillance,” is an initiative of eight
technology companies who believe their brands were dam-
11. “Google Blurs Faces in Street View Map Pictures,” The Economic Times, May
15, 2008, available at http://articles.economictimes.indiatimes.com/2008-05-15/
news/27714235_1_street-view-google-blog-post-google-spokeswoman.
12. David Gewirtz, 2013: The Year Trust Died, ZDNet, Dec. 9, 2013, available at http://
www.zdnet.com/2013-the-year-trust-died-7000024067/.
R STREET POLICY STUDY: 2014 HAS THE NSA POISONED THE CLOUD? 4
5. aged by the PRISM revelations: AOL, Apple, Facebook,
Google, LinkedIn, Microsoft, Twitter and Yahoo. “People
won’t use technology they don’t trust,” Brad Smith, gener-
al counsel and executive vice president of legal at Micro-
soft, stated in a letter to President Obama and Congress.
“Governments have put this trust at risk, and governments
need to help restore it.”13
Separately, Google and Yahoo have
petitioned the government for the right to inform custom-
ers when intelligence and law enforcement agencies have
requested data and the type of data that was sought.
Ironically, the NSA turned the competitive edge U.S. com-
panies have in cloud computing into a liability, especially in
Europe. Commercially, it will give European competitors an
opportunity to promote their own systems as more secure
and as safe from U.S. law enforcement. Second, on the regu-
latory front, it provides impetus for the privacy measures
the European Union wants on certain cloud-based services.
These measures could undercut the U.S. firms’ competi-
tiveness. For example, such rules would limit the ability of
content providers, search and social networking services to
access and process personal data of users for purposes of
targeted advertising or location-based services. While these
measures have a degree of popular support from regula-
tors who fear that consumers are being unduly “tracked,”
research shows that regulation that limits the use of targeted
advertising and other personalized cloud services inhibits
growth, innovation and overall use.14
Similarly, Internet companies face “Do Not Track” regula-
tion in a number of states, including California, which would
put severe limits on their ability to provide free services in
exchange for user data. Data has shown that American users
historically have been comfortable with current Internet
business models. In a 2013 Zogby poll, 70 percent of respon-
dents said they’d like at least some ads tailored directly to
their interests, while 40 percent said they wanted all their
ads targeted.15
Nonetheless, in the wake of the NSA revela-
tions, activist legislators may take advantage of a wave of
popular unease to enact regulations that in, the long term,
prove harmful to Internet service and innovation.
POTENTIAL SOLUTIONS
The NSA’s surveillance activities represent a massive over-
reach on the part of the U.S. government into the private
communications and information transactions of its citi-
zens—communications and transactions for which there is
a reasonable expectation of privacy. Therefore, the govern-
ment needs to be restrained through clear laws and policies
that govern the collection of private and proprietary data.
President Obama’s response falls short. Although he said the
government will stop storing phone records, he nonetheless
implied that phone companies would continue to do so on
the government’s behalf. The appointment of John Podesta
to review privacy concerns appears cosmetic. For one, what
metrics will determine Mr. Podesta’s effectiveness? The fact
that Obama did not call for judicial review of National Secu-
rity Letters, nor a halt to NSA efforts to break encryption,
remains troubling.
PRISM, MUSCULAR, Quantum and all of the other NSA sur-
veillance programs that have come to light should not just be
tweaked, reformed or repaired. They are all unconstitutional
programs that need to be scrapped.
1. Dismantle PRISM and rebuild a surveillanceprogram
in accordance with specific defense and homeland
security goals.
Surveillance is a useful tool for law enforcement, but it yields
the best results when employed against suspected wrong-
doers and where there is concrete evidence of a crime or
conspiracy. Long before PRISM, law enforcement agencies
required judicial sign-off on wiretaps and searches. There is
no reason these protections cannot be extended to anti-ter-
rorism efforts. PRISM and the other programs have grown
so large that it should not be surprising they have not found
any actionable intelligence. After news of the PRISM broke
last June, Gen. Keith Alexander, the NSA director, told Con-
gress that NSA surveillance programs stopped at least 50
terrorist attacks. Since then, that figure has been called into
question. In a review of cases brought against 225 individu-
als associated with al-Qaeda or inspired by its ideology who
were charged in the United States with an act of terrorism
since 9/11, the New America Foundation found the NSA’s
bulk surveillance programs played an identifiable role in at
most, 1.8 percent of these cases. Instead, the report found,
traditional law enforcement investigative methods—the use
of informants, tips from local communities, and targeted
intelligence operations, provided the initial impetus nearly
all of these investigations.16
As Judge Leon noted in his decision finding PRISM uncon-
stitutional—there is no evidence that PRISM prevented any-
thing. His observation serves as both a legal and practical
indictment of the program.
13. Microsoft Corp. News Release, “Tech Company Coalition Supports Global Sur-
veillance Principles, Calls on US to Lead Reform Efforts,” Microsoft Corp., Dec. 8, 2013,
available at http://www.microsoft.com/en-us/news/press/2013/dec13/12-08compa-
nycoalitionpr.aspx.
14. cf. Avi Goldfarb and Catherine E. Tucker,“Privacy Regulation and Online
Advertising,” University of Toronto, August 5, 2010,available at http://ssrn.com/
abstract=1600259.
15. Katy Bachman, “Poll: Targeted Advertising Is Not the Bogeyman [Updated],”
Adweek, April 18, 2013, available at http://www.adweek.com/news/technology/poll-
targeted-advertising-not-bogeyman-updated-148649.
16. Peter Bergen, David Sterman, Emily Schneider and Bailey Cahall, “Do NSA’s Bulk
Surveillance Program Stop Terrorists?” New America Foundation, January 13, 2014,
pp. 1-2, available at http://www.newamerica.net/publications/policy/do_nsas_bulk_
surveillance_programs_stop_terrorists.
R STREET POLICY STUDY: 2014 HAS THE NSA POISONED THE CLOUD? 5
6. 2. Enact legislation that recognizes that expectation of
privacy extends to personal data stored in the cloud.
The Fourth Amendment to the Constitution secures citizens’
“papers and effects” against unreasonable searches and sei-
zures. In the 21st
century, arguing that the Bill of Rights does
not apply because papers and effects are stored in electronic
form on the Internet, not in a roll-top desk at home, is legal
sophistry.
For several years, there have been bipartisan efforts to
extend Fourth Amendment protection to cloud-based data,
either through new bills, or a rewrite of the 28-year-old Elec-
tronic Communications Privacy Act. Little by little, courts
have been chipping away at law enforcement’s blatant use of
surveillance in the cloud, but legislation would do the most
toward curbing this abuse. Congress should be encouraged
to move forward. This would go a long way toward reining in
collection of Internet data through clandestine use of wire-
tapping, back doors or decryption codes.
3. Allow for greater transparency and accountability
Had there been appropriate judicial and legislative over-
sight, it is hard to imagine that these surveillance programs
would have grown as large and intrusive as they did. Any
future surveillance programs require the checks and bal-
ances of oversight from lawmakers who represent the peo-
ple and from an independent judiciary. Laws that authorize
such programs must incorporate mechanisms for transpar-
ency and accountability, especially when the government
demands information owned by third-party companies.
Among these, companies should have the right:
• To be notified when their infrastructure is being
used for surveillance;
• To disclose instances when they have been asked
to assist with surveillance and turn over information
• To demand that due process be followed
• To oversight of domestic civilian surveillance by
conventional courts, not FISA or secret military courts
• To requests for data that are held to the same stan-
dard as other search warrants, wherein the requester
must identify the suspect, the probable cause, the data
to be searched and what specific information is being
sought.
As House Judiciary Committee Chairman Bob Goodlatte,
R-Va., put it: “We must ensure our nation’s intelligence col-
lection programs include real protections for Americans; civ-
il liberties, robust oversight, and additional transparency.”17
In a free society, individuals are not automatically assumed
to be suspects that need to be vetted and surveyed. Citizens
have the right to go about their business without the need
to answer to the state for every thought, act, purchase or
Facebook comment. The argument that widespread surveil-
lance is required to secure the common defense is specious,
anditsdarkconsequenceswerearticulatedbyGeorgeOrwell
almost 70 years ago in the novel 1984:
You had to live—did live, from habit that became
instinct—in the assumption that every sound you
made was overheard, and, except in darkness, every
movement scrutinized.18
While not every aspect of Orwell’s grim vision of a totalitar-
ian regime has come to pass, one unsettling aspect of 1984
has: the surveillance state he envisioned is a practical reality.
The government, indeed, has shown it can use technology
to keep tabs on much of what its citizens are doing. Fortu-
nately, we still hold to the idea that the government itself is
subject to its own laws. It will be critical to remember this
as we seek to reclaim our fundamental right to privacy and
to be left alone.
ABOUT THE AUTHOR
Steven Titch is an associate fellow at the R Street Institute, focused
on telecommunications, Internet and information technology. He
also serves as a policy advisor to the Heartland Institute and is a
former policy analyst at the Reason Foundation. His columns have
appeared in Investor’s Business Daily, the Washington Examiner and
the Houston Chronicle.
Titch also was co-founder and executive producer of Security
Squared, a business-to-business Web publication covering IT con-
vergence in physical security and surveillance. Previously, Titch was
editor of Network-Centric Security and director of editorial projects
for Data Communications magazine. He also has held the positions
of editorial director of Telephony, editor of Global Telephony maga-
zine, Midwest bureau chief of Communications Week and associate
editor-communications at Electronic News.
17. House Judiciary Committee, “Goodlatte Statement on PCLOB’s Report on
Intelligence-Gathering Programs,” Jan. 23, 2014. http://judiciary.house.gov/index.cfm/
press-releases?ID=E9B835FE-AA07-4A06-9DCB-91494B463BF1
18. George Orwell, 1984, Harcourt Brace Jovanovich, New York, 1949 (64th Signet
Edition), pp. 6-7.
R STREET POLICY STUDY: 2014 HAS THE NSA POISONED THE CLOUD? 6