Risk
6/12/2013
03:03 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

NSA Prism: Google, Facebook Want More Transparency

Fearing loss of customer trust, Google, Facebook, Microsoft and Twitter ask for permission to share more information about government data demands.

The Syrian Electronic Army: 9 Things We Know
(click image for larger view)
The Syrian Electronic Army: 9 Things We Know
Although there might be national security benefits to the NSA's collection of phone and Internet data, there also might be national economic costs.

U.S. Internet companies are now being viewed in a different light, one that could dim the prospects of business from abroad.

Already, according to Russian media company RT, Russian MP Ilya Kostunov has sent letters to the heads of the country's defense and communications ministries seeking support for punishing civil servants' use of U.S. social networks and Internet services under a recently broadened treason law.

Viviane Reding, Commissioner of Justice for the European Union, meanwhile announced on Wednesday that she intends to raise the issue of U.S. data collection at a meeting with U.S. Attorney General Eric Holder on Friday. In a statement, she expressed concern about the business implications of mass surveillance. In other words, loss of individual privacy is not the only thing at stake.

[ Would knowing more about how the NSA combs data ease your privacy concerns? Read Defending NSA Prism's Big Data Tools. ]

"Trust that the rule of law will be respected also is essential to the stability and growth of the digital economy, including transatlantic business," she said. "This is of paramount importance for individuals and companies alike."

Time will tell whether this is political posturing or a sea change that limits the commercial opportunities of U.S. technology companies abroad in the same way that national security concerns last year limited the ability of Chinese telecom equipment maker Huawei to compete for U.S. government contracts. But the U.S. companies implicated in the NSA surveillance scandal are not waiting to find out whether they need to address a loss of customer confidence.

Google on Tuesday asked Attorney General Eric Holder and FBI Director Robert Mueller to allow the company to publish information about the full range of government demands for user data that it receives.

Google already publishes partial information in its semi-annual transparency report, but it does not include data demands related to national security, apart from a count of National Security letters received.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
xBaja
50%
50%
xBaja,
User Rank: Apprentice
6/12/2013 | 11:34:04 PM
re: NSA Prism: Google, Facebook Want More Transparency
Google and Facebook are truly amazed the NSA has less information on you than they do.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8893
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8894
Published: 2015-01-28
Open redirect vulnerability in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the out parameter.

CVE-2014-8895
Published: 2015-01-28
IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote attackers to bypass intended access restrictions and read the image files of arbitrary users via a crafted URL.

CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.