{"id":1336,"date":"2014-01-28T21:42:29","date_gmt":"2014-01-29T02:42:29","guid":{"rendered":"http:\/\/www.opensource.im\/?p=1336"},"modified":"2014-01-28T21:42:29","modified_gmt":"2014-01-29T02:42:29","slug":"preventing-spying-on-nsa-spying","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/preventing-spying-on-nsa-spying.php","title":{"rendered":"Preventing spying on NSA spying"},"content":{"rendered":"<p><p>  FILE - In this Jan. 23, 2014 file photo, President Barack Obama  speaks in the East Room of the White House in Washington. The  U.S. government is looking at ways to prevent anyone from spying  on its own surveillance of Americans phone records. As the Obama  administration considers shifting the collection of Americans  phone records from the National Security Agency to requiring that  they be stored at phone companies or elsewhere, its quietly  funding research that would allow it to search the information  using encryption so that phone company employees or eavesdroppers  couldnt see who the U.S. is spying on, The Associated Press has  learned. (AP Photo\/Carolyn Kaster, File)<\/p>\n<p>    WASHINGTON (AP)  As the Obama administration    considers ending the storage of millions of phone records by    the National Security Agency, the government is quietly funding    research to prevent eavesdroppers from seeing whom the U.S. is    spying on, The Associated Press has learned.  <\/p>\n<p>    The Office of the Director of National    Intelligence has paid at least five research teams    across the country to develop a system for high-volume,    encrypted searches of electronic records kept outside the    governments possession. The project is among several ideas    that could allow the government to store Americans phone    records with phone companies or a third-party organization, but    still search them as needed.  <\/p>\n<p>    Under the research, U.S. data mining would be    shielded by secret coding that could conceal identifying    details from outsiders and even the owners of the targeted    databases, according to documents obtained by The Associated    Press and interviews with researchers, corporate executives and    government officials.  <\/p>\n<p>    The administration has provided only vague descriptions about    changes it is considering to the NSAs daily collection and    storage of Americans phone records, which are presently kept    in NSA databanks. To resolve legal, privacy    and civil liberties concerns, President Barack Obama this month    ordered the attorney general and senior intelligence officials    to recommend changes by March 28 that would allow the U.S. to    identify suspected terrorists phone calls without the    government itself holding the phone records.  <\/p>\n<p>    One federal review panel urged Obama to order phone companies    or an unspecified third party to store the records; another    panel said collecting the phone records was illegal and    ineffective and urged Obama to abandon the program entirely.  <\/p>\n<p>    Internal documents describing the Security and Privacy    Assurance Research project do not cite the NSA or its phone    surveillance program. But if the project were to prove    successful, its encrypted search technology could enable the    NSA to conduct secure searches while shifting storage of phone    records from agency data banks to either phone companies or a    third-party organization.  <\/p>\n<p>    A DNI spokesman, Michael Birmingham, confirmed that the    research was relevant to the NSAs phone records program. He    cited interest throughout the intelligence community but    cautioned that it may be some time before the technology is    used.  <\/p>\n<p>    The intelligence directors office is by law exempt from    disclosing detailed budget figures, so its unclear how much    money the government has spent on the project, which is    overseen by the DNIs Intelligence Advanced Research Projects    Activity office. Birmingham said the research is aimed for use    in a situation where a large sensitive data set is held by one    party which another seeks to query, preserving privacy and    enforcing access policies.  <\/p>\n<p>    A Columbia University computer sciences expert    who heads one of the DNI-funded teams, Steven M. Bellovin,    estimates the government could start conducting encrypted    searches within the next year or two.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/wwlp.com\/2014\/01\/28\/preventing-spying-on-nsa-spying\/\" title=\"Preventing spying on NSA spying\">Preventing spying on NSA spying<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> FILE - In this Jan. 23, 2014 file photo, President Barack Obama speaks in the East Room of the White House in Washington. The U.S<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-1336","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1336"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}