Who is using the telecoms to betray our personal lives?
Expectation of privacy a precious right
By BABAK PASDAR
GUEST COLUMNIST, SEATTLE POST-INTELLIGENCER
In October 2003, I led a rapid deployment team for a major wireless carrier responsible for overhauling its security system. For the past year and a half, I have anonymously briefed Congress and nongovernment organizations about my observations, going public last month with crucial public interest information: An unknown third party using a mysterious "Quantico Circuit" has provided the federal government with unfettered access to everything on the carrier's network.
Recognizing this critical security breach and taking preliminary correction steps, my attempts at implementing controls and logging were blocked and rebutted with threats and admonishments by carrier executives. Despite ready capabilities, the company had opted not to protect itself and its customers.
Unfettered access to the carrier's systems offers powerful information. All calls and data communications including e-mail, Web, text messages, pictures and videos are attainable in real-time. Any person could be physically located, and billing records including names, financial information, contacts and behavioral data, are accessible. Tracking abilities have expanded to subscriber desktops with new "smartphones" -- unnecessarily requiring personal log on credentials to business and personal computers to deliver e-mail, contact and calendaring information. This entrusts private information with the carrier that goes far beyond mobile phone usage.
On March 4, I disclosed my experience in an affidavit to Congress. On March 6, House Commerce Committee Chairman John Dingell wrote a "Dear Colleague" letter to all 435 House members requesting an investigation prior to any carrier immunity discussions. On March 14, the House voted to deny immunity and to investigate the telecoms.
Who was at the other end of the Quantico Circuit? What information did they obtain? Does this comply with longstanding federal law? Are telecoms and other corporations paid to betray our privacy? We need answers to those questions and more.
(Continued here.)
By BABAK PASDAR
GUEST COLUMNIST, SEATTLE POST-INTELLIGENCER
In October 2003, I led a rapid deployment team for a major wireless carrier responsible for overhauling its security system. For the past year and a half, I have anonymously briefed Congress and nongovernment organizations about my observations, going public last month with crucial public interest information: An unknown third party using a mysterious "Quantico Circuit" has provided the federal government with unfettered access to everything on the carrier's network.
Recognizing this critical security breach and taking preliminary correction steps, my attempts at implementing controls and logging were blocked and rebutted with threats and admonishments by carrier executives. Despite ready capabilities, the company had opted not to protect itself and its customers.
Unfettered access to the carrier's systems offers powerful information. All calls and data communications including e-mail, Web, text messages, pictures and videos are attainable in real-time. Any person could be physically located, and billing records including names, financial information, contacts and behavioral data, are accessible. Tracking abilities have expanded to subscriber desktops with new "smartphones" -- unnecessarily requiring personal log on credentials to business and personal computers to deliver e-mail, contact and calendaring information. This entrusts private information with the carrier that goes far beyond mobile phone usage.
On March 4, I disclosed my experience in an affidavit to Congress. On March 6, House Commerce Committee Chairman John Dingell wrote a "Dear Colleague" letter to all 435 House members requesting an investigation prior to any carrier immunity discussions. On March 14, the House voted to deny immunity and to investigate the telecoms.
Who was at the other end of the Quantico Circuit? What information did they obtain? Does this comply with longstanding federal law? Are telecoms and other corporations paid to betray our privacy? We need answers to those questions and more.
(Continued here.)
0 Comments:
Post a Comment
<< Home