Welcome!

@BigDataExpo Authors: Karyn Jeffery, Pat Romanski, Elizabeth White, Scott Allen, Ed Featherston

News Feed Item

Research and Markets: Stratecast Confidential Report 2014: The Impact of the NSA on the Big Data Market and Global Communications

Research and Markets (http://www.researchandmarkets.com/research/rc43rq/stratecast) has announced the addition of the "Stratecast Confidential: The Impact of the NSA on the Big Data Market and Global Communications" report to their offering.

This report analyzes privacy issues surrounding the NSA, how they appear similar to those found in other sectors, and how lessons learned in one area may potentially benefit, or at least inform, other areas in pursuit of an equitable balance between the need to know and the right to privacy.

The National Security Agency/Central Security Service of the United States, or NSA/CSS, has inserted itself into the realm of Big Data. The intent of this report is to discuss how it has done so, and to analyze the issues and impacts resulting from its actions, both on the populace at large and specifically on Big Data.

The report's main conclusions and takeaways are as follows:

1. The NSA/CSS (referred to hereafter in this report simply as the NSA) now has access to detailed information about much of the electronic communication in the U.S. This includes virtually all mobile communications, virtually all online communications, whether mobile or computer-based, and some landline business communications. It includes phone and data traffic originating inside the U.S. and terminating either inside or outside the U.S. The NSA also has access to most of the credit card transactions occurring in the U.S.; and, as an addon to its 24/7 surveillance of U.S.-based mobile communications, the NSA is also tapping into the most popular mobile phone applications, including Angry Birds.

2. The NSA is collecting data from these sources as a result of agreements it has specifically imposed on mobile operators and Internet infrastructure providersthrough electronic back doors it has persuaded providers to insert in their software and systems, and through its own ability to troll communications highways and collect data at will. Providers such as Google have angrily denounced the NSA's actions, and claim to have agreed to no such thing; but whatever the case, the end result is the same.

3. The NSA claims to simply be interested in, and collecting, metadata, a term that is roughly equivalent to data about the data. In the case of what the NSA is claiming, this means information such as call origination and destination points, call duration, where someone accessed the Web and how much time they spent online; not the content of calls or emails. Yet, the NSA is hard at work cracking the code, so to speak, of Secure Sockets Layer (SSL), the protocol that, until now, has kept the content of online communications and transactions hidden from prying eyes. The NSA has also now set its sights on the Advanced Encryption Standard (AES), which is an encryption algorithm for securing sensitive but unclassified material by U.S. government agencies, and is being used more and more for commercial transactions. The NSA's actions with regard to SSL and AES have content inspection written all over them.

4. The NSA is far from the only entity that appears to be trampling on the notion of personal privacy in pursuit of information it believes it needs to achieve its ends. The private sector, too, is teeming with examples of companies obtaining personal user data through questionable means, and deploying it in even more questionable ways.

5. Concepts and technologies currently in use or development, such as Harvard University's extensive work on Differential Privacy, are predicated on the point raised in the previous bullet: threats to privacy occur in the private sector and academia as well. Differential Privacy leverages the commonalities across sectors to point the way to solutions. However, implementing helpful technologies is one thing; getting industries and governments to overcome their desire for information control, and actually implement solutions is another. BDA 2-05, April 2014

6. The upshot of all of this is that, while privacy is already threatened or extinct in a growing number of places, the NSA's actions are accelerating and expanding this phenomenon. That is already sufficiently concerning in terms of quality of life; but further, since electronic communications are the lifeblood of a great deal of commercial activity, the NSA may also begin to have a chilling effect on the U.S. economy.

Key Topics Covered:

1. Executive Summary

2. Introduction

3. When You Communicate Electronically in the U.S., Are You Handing Your Data Over to the NSA? Quite Possibly: Yes

4. "Not Content; Just Metadata"? NSA Encryption-cracking Suggests Otherwise

5. Google May Be Protecting Users from the NSA, but Not from Itself

6. U.S. Legislative Action Could Curb the NSA's Actions . . . but When?

7. Differential Privacy May Hold Answers to Keeping the Peace and Privacy, Too

8. Technology May Hold the Key -- or Run Aground on Government Control

9. Could Clamping Down on Threats Squeeze the Life Out of the U.S. Economy?

10. The Last Word

For more information visit http://www.researchandmarkets.com/research/rc43rq/stratecast

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@BigDataExpo Stories
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...