The Fallout from NSA’s Alleged Data Infiltration



Number of words: 421

On October 30, the Washington Post published a story that set the industry’s hair on fire: “NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say.” The story was co-authored by Bart Gellman, a journalist I had known and respected since he wrote for the Daily Princeton an at Princeton University, where we were undergraduates together. His article said that the NSA, with the help of the British government, was surreptitiously tapping into undersea fiber-optic cables to copy data from Yahoo! and Google networks. While we could not verify whether the NSA was targeting our cables, some of Snowden’s documents also referred to our consumer email and messaging services. That made us suspect we had been tapped as well. To this day, the US and British governments have not spoken publicly to deny hacking into data cables.

The tech sector responded with a combination of astonishment and anger. At one level, the story provided a missing link in our understanding of the Snowden documents. It suggested that the NSA had much more of our data than we had lawfully provided through national security orders and search warrants. If this was true, the government in effect was conducting a search and seizure of people’s private information on a massive scale.

The Washington Post story indicated that the NSA, in collaboration with its British counterpart, was pulling data from the cables used by American technology companies, potentially without judicial review or oversight. We worried that this was happening where cables intersected in the United Kingdom. As lawyers across the industry compared notes, we theorized that the NSA persuaded itself that by working with or relying upon the British government and acting outside US borders, it was not subject to the Fourth Amendment to the US Constitution and its requirement that the NSA search and seize information only pursuant to due process and court orders.

The reaction at Microsoft and across the industry was swift. In the weeks that followed, we and other companies announced that we would implement strong encryption for all the data we moved between our data centers on fiber-optic cables, as well as for data stored on servers in our data centers themselves. It was a fundamental step in protecting customers, because it meant that even if a government siphoned up customer data by tapping into a cable, it would almost certainly be unable to unlock and read what it had obtained.

Excerpted from pages 13 to 14 of ‘Tools and Weapons’ by Brad Smith and Carol Browne

Leave a Comment