Welcome!

Big Data Journal Authors: Noel Wurst, Kira Makagon, Elizabeth White, Dana Gardner, Liz McMillan

News Feed Item

Research and Markets: Stratecast Confidential Report 2014: The Impact of the NSA on the Big Data Market and Global Communications

Research and Markets (http://www.researchandmarkets.com/research/rc43rq/stratecast) has announced the addition of the "Stratecast Confidential: The Impact of the NSA on the Big Data Market and Global Communications" report to their offering.

This report analyzes privacy issues surrounding the NSA, how they appear similar to those found in other sectors, and how lessons learned in one area may potentially benefit, or at least inform, other areas in pursuit of an equitable balance between the need to know and the right to privacy.

The National Security Agency/Central Security Service of the United States, or NSA/CSS, has inserted itself into the realm of Big Data. The intent of this report is to discuss how it has done so, and to analyze the issues and impacts resulting from its actions, both on the populace at large and specifically on Big Data.

The report's main conclusions and takeaways are as follows:

1. The NSA/CSS (referred to hereafter in this report simply as the NSA) now has access to detailed information about much of the electronic communication in the U.S. This includes virtually all mobile communications, virtually all online communications, whether mobile or computer-based, and some landline business communications. It includes phone and data traffic originating inside the U.S. and terminating either inside or outside the U.S. The NSA also has access to most of the credit card transactions occurring in the U.S.; and, as an addon to its 24/7 surveillance of U.S.-based mobile communications, the NSA is also tapping into the most popular mobile phone applications, including Angry Birds.

2. The NSA is collecting data from these sources as a result of agreements it has specifically imposed on mobile operators and Internet infrastructure providersthrough electronic back doors it has persuaded providers to insert in their software and systems, and through its own ability to troll communications highways and collect data at will. Providers such as Google have angrily denounced the NSA's actions, and claim to have agreed to no such thing; but whatever the case, the end result is the same.

3. The NSA claims to simply be interested in, and collecting, metadata, a term that is roughly equivalent to data about the data. In the case of what the NSA is claiming, this means information such as call origination and destination points, call duration, where someone accessed the Web and how much time they spent online; not the content of calls or emails. Yet, the NSA is hard at work cracking the code, so to speak, of Secure Sockets Layer (SSL), the protocol that, until now, has kept the content of online communications and transactions hidden from prying eyes. The NSA has also now set its sights on the Advanced Encryption Standard (AES), which is an encryption algorithm for securing sensitive but unclassified material by U.S. government agencies, and is being used more and more for commercial transactions. The NSA's actions with regard to SSL and AES have content inspection written all over them.

4. The NSA is far from the only entity that appears to be trampling on the notion of personal privacy in pursuit of information it believes it needs to achieve its ends. The private sector, too, is teeming with examples of companies obtaining personal user data through questionable means, and deploying it in even more questionable ways.

5. Concepts and technologies currently in use or development, such as Harvard University's extensive work on Differential Privacy, are predicated on the point raised in the previous bullet: threats to privacy occur in the private sector and academia as well. Differential Privacy leverages the commonalities across sectors to point the way to solutions. However, implementing helpful technologies is one thing; getting industries and governments to overcome their desire for information control, and actually implement solutions is another. BDA 2-05, April 2014

6. The upshot of all of this is that, while privacy is already threatened or extinct in a growing number of places, the NSA's actions are accelerating and expanding this phenomenon. That is already sufficiently concerning in terms of quality of life; but further, since electronic communications are the lifeblood of a great deal of commercial activity, the NSA may also begin to have a chilling effect on the U.S. economy.

Key Topics Covered:

1. Executive Summary

2. Introduction

3. When You Communicate Electronically in the U.S., Are You Handing Your Data Over to the NSA? Quite Possibly: Yes

4. "Not Content; Just Metadata"? NSA Encryption-cracking Suggests Otherwise

5. Google May Be Protecting Users from the NSA, but Not from Itself

6. U.S. Legislative Action Could Curb the NSA's Actions . . . but When?

7. Differential Privacy May Hold Answers to Keeping the Peace and Privacy, Too

8. Technology May Hold the Key -- or Run Aground on Government Control

9. Could Clamping Down on Threats Squeeze the Life Out of the U.S. Economy?

10. The Last Word

For more information visit http://www.researchandmarkets.com/research/rc43rq/stratecast

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories from Big Data Journal
Come learn about what you need to consider when moving your data to the cloud. In her session at 15th Cloud Expo, Skyla Loomis, a Program Director of Cloudant Development at Cloudant, will discuss the security, performance, and operational implications of keeping your data on premise, moving it to the cloud, or taking a hybrid approach. She will use real customer examples to illustrate the tradeoffs, key decision points, and how to be successful with a cloud or hybrid cloud solution.
For the last hundred years, the desk phone has been a staple of every business. The landline has been a lifeline to customers and colleagues as the primary means of communication – even as email threatened to render the telephone obsolete. For some purposes, like conference calling, there was simply no substitute. That is, until a few years ago. With all due respect and apologies to Mr. Alexander Graham Bell, the desk phone is becoming just one solution, out of many devices, used for the modern...
The emergence of cloud computing and Big Data warrants a greater role for the PMO to successfully manage enterprise transformation driven by these powerful trends. As the adoption of cloud-based services continues to grow, a governance model is needed to orchestrate enterprise cloud implementations and harness the power of Big Data analytics. In his session at 15th Cloud Expo, Mahesh Singh, President of BigData, Inc., to discuss how the Enterprise PMO takes center stage not only in developing th...
The Open Group and BriefingsDirect recently assembled a distinguished panel at The Open Group Boston Conference 2014 to explore the practical implications and limits of the Internet of Things. This so-called Internet of Things means more data, more cloud connectivity and management, and an additional tier of “things” that are going to be part of the mobile edge -- and extending that mobile edge ever deeper into even our own bodies. Yet the Internet of Things is more than the “things” – it me...
Software is eating the world. Companies that were not previously in the technology space now find themselves competing with Google and Amazon on speed of innovation. As the innovation cycle accelerates, companies must embrace rapid and constant change to both applications and their infrastructure, and find a way to deliver speed and agility of development without sacrificing reliability or efficiency of operations. In her keynote DevOps Summit, Victoria Livschitz, CEO of Qubell, will discuss ho...
In today's application economy, enterprise organizations realize that it's their applications that are the heart and soul of their business. If their application users have a bad experience, their revenue and reputation are at stake. In his session at 15th Cloud Expo, Anand Akela, Senior Director of Product Marketing for Application Performance Management at CA Technologies, will discuss how a user-centric Application Performance Management solution can help inspire your users with every appli...
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With “smart” appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user’s habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps,...
Predicted by Gartner to add $1.9 trillion to the global economy by 2020, the Internet of Everything (IoE) is based on the idea that devices, systems and services will connect in simple, transparent ways, enabling seamless interactions among devices across brands and sectors. As this vision unfolds, it is clear that no single company can accomplish the level of interoperability required to support the horizontal aspects of the IoE. The AllSeen Alliance, announced in December 2013, was formed wi...
Goodness there is a lot of talk about cloud computing. This ‘talk and chatter’ is part of the problem, i.e., we look at it, we prod it and we might even test it out – but do we get down to practical implementation, deployment and (if you happen to be a fan of the term) actual cloud ‘rollout’ today? Cloud offers the promise of a new era they say – and a new style of IT at that. But this again is the problem and we know that cloud can only deliver on the promises it makes if it is part of a well...
There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at 6th Big Data Expo®, Hannah Smalltree, Director at Treasure Data, to discuss how IoT, B...