Light Reading Mobile – Telecom News, Analysis, Events, and Research

EuroBlog  
Ray Le Maistre

Prism in a Big Data World

June 10, 2013 | Ray Le Maistre |
The revelations concerning the U.S. National Security Agency (NSA)'s Prism surveillance program and the global implications of that program are fascinating. But are they shocking?

I don't think so. Wherever data is stored in a digital format, it will be accessed by those other than the guardians of that data -- that is a reality in 2013.

And is there a communications service provider in the world that doesn't hand over customer records to security agencies? That would be shocking. Verizon Communications Inc. has been named in the early reports about the NSA's recent activities, but that is just a matter of timing. If this story had broken on another date, it might have been AT&T Inc.

Of course, there is a major ethical debate concerning data security and surveillance strategies and rightly so: There are policies in place globally that enable security agencies to request data downloads from telcos and ISPs but even the suggestion that the NSA is plucking data from the servers of Web services giants as and when it feels the need to do so will likely have major implications for the likes of Apple Inc., Facebook, Google et al. In what way might regular users change their social media habits? Will people be scared to wear Google glasses for fear of having their lives and experiences tracked by an invisible security application? (See NSA Dragnet Debacle: What It Means to IT.)

Whether any debates, rulings or even legal decisions will ever change the modus operandi of any security agencies is, I believe, very much in doubt. It will be business as usual for the spooks that spy on anyone they feel deserves being spied upon, whether domestic or overseas.

Putting aside the ethical issues involved, what the Prism revelations have done is bring the topics of Big Data and analytics under the global spotlight. In that context, it's intriguing just how data is extracted, sorted and examined: Exactly what do the security agencies do with the data and how much "intelligence" can they gather from it? Already the names of various Israeli vendors are being linked to the Prism operations and, again, that doesn't come as a surprise -- if you want the best data technology, then you start by asking companies from the most tech-centric country in the world, right?

All the major CSPs and Web services firms have their own Big Data strategies (for commercial reasons, you understand, though of course there's a major element of "snooping" involved). Those strategies are now set to come under the spotlight too.

After Prism, paranoia could be the next major "P word" of the year. But whatever the fallout from the Prism program, don't expect to be too shocked. Outraged, maybe, but not shocked.

— Ray Le Maistre, Editor-in-Chief, Light Reading



Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.
 

Going Soft at MWC

SPONSORED BY
More EuroBlog
Security Concerns Cling to Huawei
Redacted UK security report raises further concerns about Chinese vendor's perceived state links
Policy Is NFV's Pacesetter
The policy control players are setting the network functions virtualization (NFV) pace and scrambling for kudos
NSN & Intel Get Edgy
A combination of liquid applications and virtualization power could be interesting
Joyeux Anniversaire Ethernet
Ethernet is 40 years old and some European service provider execs are crashing the party
Telefónica + Samsung: Digital Dream Team?
It's not the end game, but a new accord between Telefónica Digital and Samsung is showing the way for traditional telcos
White Papers SPONSORED CONTENT
Featured
Docsis Provisioning of EPON (DPoE)
CableLabs spec that blends Docsis-style provisioning with EPON