Surveillance or Security in the NSA Report
Much commentary has already been generated by the report from the President’s Review Group on Intelligence and Communications Technologies - widely referred to as "The NSA Report" - especially its recommendation that the NSA discontinue the controversial Section 215 program of collecting telephony metadata. We thought it worth pointing out that Susan Landau's authoritative book on the subject, Surveillance or Security?, is cited in a footnote in the report at page 192, during a discussion of cryptography standards.
The NSA's role is not only listening to other people's communications; it's Information Assurance Directorate is responsible for protecting US military and diplomatic communications. This means developing cryptography for US government uses. But the leaked documents show that not only has NSA been broadly listening in everywhere, it has also been actively attacking cryptographic standards - a clear conflict for the agency. As the report puts it:
We are concerned that having IAD embedded in a foreign intelligence organization creates potential conflicts of interest. A chief goal of NSA is to access and decrypt SIGINT, an offensive capability. By contrast, IAD’s job is defense. When the offensive personnel find some way into a communications device, software system, or network, they may be reluctant to have a patch that blocks their own access. This conflict of interest has been a prominent feature of recent writings by technologists about surveillance issues
...including our own Dr. Landau, who's currently a Senior Staff Privacy Analyst at Google.
Or, if you prefer to use an RSS reader, you can subscribe to the Blog RSS feed.RSS
Blogs We Like
Books, news, and ideas from MIT Press
The MIT PressLog is the official blog of MIT Press. Founded in 2005, the Log chronicles news about MIT Press authors and books. The MIT PressLog also serves as forum for our authors to discuss issues related to their books and scholarship. Views expressed by guest contributors to the blog do not necessarily represent those of MIT Press.