Newsletters
Technology, Discovery & Innovation NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Computing Digital Life Discovery Space More Topics...
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Computing
Average Rating:
Rate this article:  
EPIC Objects To Google-NSA Cyber Partnership
EPIC Objects To Google-NSA Cyber Partnership

By Patricia Resende
February 4, 2010 12:50PM

Bookmark and Share
The Electronic Privacy Information Center has objected to Google reportedly working with the National Security Administration to identify who was behind a recent cyberattack. EPIC fears the NSA will get access to users' privacy. EPIC's Marc Rotenberg said the backdoor partnership between Google and the NSA should be made public.
 



Internet search giant Google has tapped government agencies to help the company find the person or people responsible for a recent cyberattack. But privacy advocates are not happy with the backdoor partnership between Google and government authorities.

Google is working with the National Security Administration (NSA), according to published reports. While the company admits it's working with relevant U.S. authorities on the cyberattack, Google would not disclose which agencies are involved.

"Quite frankly, most in the business of data mining and its related research area would be surprised to learn Google had not been cooperating with NSA all along," said Jart Armin, a security expert with Host Exploit.

Boosting the Home Team

If the two are working together, they are sharing information without breaking any U.S. laws or Google policies, according to reports. While it may only be for defensive purposes, privacy advocates object to Google working with an agency that conducts surveillance. Privacy advocates also worry that users' privacy will be under the microscope of the same agency created to protect Americans' security.

What they will probably find is that the attack was commercially inspired to rattle Google and gain competitive advantage via industrial espionage, Armin suggested.

"With this perception and now public confirmation, many should not be surprised China -- and several other countries for that matter, including Russia -- would rather have their homegrown search engines in prevalence, such as Baidu," Armin said. "Baidu has 60 percent-plus of the China market and obviously is culturally more appealing than Google for most Chinese."

Privacy advocates also say these kind of practices, currently being done in secret, should be done in public.

Seeking NSA Document

"This raises substantial concern about the adequacy of privacy standards," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, a public-interest group focused on civil liberties, protecting privacy, and enforcing the First Amendment. "NSA enables surveillance and protects security, and these measures come in conflict."

The NSA may have to reveal whether it is the agency working Google on its cyberattack case, thanks to EPIC.

The Washington, D.C.-based EPIC has filed suit against the NSA and the National Security Council to gain a key document governing national cybersecurity policy. That document, National Security Presidential Directive 54, grants the NSA broad authority over the security of American computer networks.

Rotenberg said the agencies violated the Freedom of Information Act by failing to make public the directive and related records after EPIC requested them.

'A Very Risky Strategy'

What does EPIC expect to gain from its legal action?

"The main goal is to make U.S. cybersecurity policy more accountable and more public," he said. "We think it is a very risky strategy for the U.S. to go forward with this broad policy plan and to go forward with Google. This is particularly important for millions of users of Google services, both in the U.S. and around the world."

Google said it's only working with authorities for defensive purposes and for the benefit of its users.

"The security and privacy of our users is of the utmost importance to us and we have a long track record of working to safeguard both," said Jill Hazelbaker, a Google spokesperson.
 

Tell Us What You Think
Comment:

Name:



You have the experience and skills, let an ISACA® certification demonstrate your value. Our certifications announce that you have the expertise and insight to speak with authority. ISACA certification is more than a credential; it's a platform that can elevate your career. Register for an Exam Today.


 Computing
1.   IBM, California Partner in the Cloud
2.   Sprint Becomes Google Apps Reseller
3.   Tor Working To Fix Security Exploit
4.   Can One Size Windows OS Fit All?
5.   Wall Street Journal Hacked Again


advertisement
Backlash Stirs Against H-1B Visas
Debate over foreign workers continues.
Average Rating:
Amazon Intros Zocalo Storage Service
Online storage and sharing for business.
Average Rating:
Tor Working To Fix Security Exploit
Bug reportedly reveals ID of users
Average Rating:


advertisement


 Random Bytes
Lenovo Still in Small Windows Tablets Are These Layoffs Best for Microsoft?
Google Hacker Team to Hunt Bugs Seagate Unveils Networked Drives
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 

Navigation
Sci-Tech Today
Home/Top News | Computing | Digital Life | Discovery | Space | Innovation | Health | Science News
Environment
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.