Feeds

Phew! Google saves US netizens from Gov snoops

What's wrong with this headline?

High performance access to file storage

Hurrah! Google has made the internet safe for US citizens! Or at least that was what the company implied late on Friday evening, after a federal judge ruled that the company didn't have to turn over a sample of anonymized search queries to the US Department of Justice, and only needed to provide a sampling of websites it searched.

"This is a clear victory for our users," Google said in a statement.

The DoJ had wanted the anonymized data to bolster its attempt to revive COPA, or the Child Online Protection Act, a 1998 law requiring site owners to restrict content, or access to content. In 2004 the Supreme Court agreed with an appellate court decision that the law violated the First Amendment.

It should be noted that Microsoft, AOL and Yahoo! meekly handed over the data without a fight. But the case was never about protecting the privacy of Google users - as no personal information was requested.

And ominously, the judge explained that there was no reason for Google to hand over the queries because the DoJ already had obtained what it wanted from Microsoft, AOL and Yahoo! who had supplied a week's worth of search queries, and a sample of million websites in their respective indices.

What should put this decision in its proper perspective is explained [subscription required] in this month's issue of article of The Atlantic, where investigative journalist and author James Bamford, whose 1983 book Puzzle Palace documented much of the work of the National Security Agency for the first time.

"Today the NSA has access to more information than ever before," Bamford reminds us.

"People express their most intimate thoughts in emails, send their tax returns over the internet, satisfy their curiosity and desires with Google searches, let their hair down in chat rooms, discuss every event over cell phones, make appointments with their BlackBerrys, and do business at Wi-Fi hot spots."

"NSA personnel ... have the ultimate goal of intercepting and reviewing every syllable and murmur zapping into, out of, or through the United States. They are close to achieving it." ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.