Feeds

Telcos wish to deny mass snooping

'Compassionate totalitarianism' proves tricky for the private sector

  • alert
  • submit to reddit

High performance access to file storage

BellSouth has demanded that USA Today must retract its story fingering the telco in the Bush Administration's mass domestic dragnet of phone records.

"BellSouth insists that your newspaper retract the false and unsubstantiated statements you have made regarding our company," the company demanded in a letter to USA Today president Craig Moon.

Previously, following last week's USA Today exposé, BellSouth had issued a statement claiming that it does not have a contract to supply the NSA with call records.

"Based on our review to date, we have confirmed no such contract exists, and we have not provided bulk customer calling records to the NSA," the statement said.

Notice that the statement did not say BellSouth had not supplied any call records to the NSA. If it had, perhaps the retraction would already be in print.

But the statement is crafted to be letter-of-the-law accurate, even if there should be an informal agreement rather than a contract, or if something other than "bulk customer calling records" have been handed over, such as "pretty big piles of customer calling records". It could also mean that a BellSouth billing contractor or other partner has supplied the information.

Meanwhile, Verizon has said that it "does not provide any government agency unfettered access to our customer records or provide information to the government under circumstances that would allow a fishing expedition".

Another nice bit of Legalese. This could mean that almost anything is going on. Not providing "unfettered access" might mean that Verizon simply delivers the records to NSA, rather than letting them set up camp on its premises, as AT&T has been accused of doing. Also, as with the BellSouth statement, the wording leaves open the possibility that a contractor is delivering the data.

And as for not allowing a "fishing expedition", one suspects this means absolutely nothing, but the lawyers thought it had a reassuring sound and decided to include it.

Since the NSA is supposedly using only bulk call data indicating patterns - that is, which nameless phone numbers are calling and receiving calls from each other - Verizon could give the agency everything it's seeking, and this would not constitute a "fishing expedition". It would be up to the NSA to plumb other databases to attach names and addresses to the numbers, and then conduct an actual fishing expedition. So don't blame Verizon if that should happen; they've got nothing to do with it.

Furthermore, both companies have said they "cannot confirm or deny" that they've got a relationship with the NSA. Now, trust a journo on this one: in the commercial world, and in the political world, whenever a flack can deny something that might be bad for trade, share values, or winning the election, they always deny it. "I cannot confirm or deny" always means, "I cannot deny". There are no exceptions to this rule outside the realm of legal constraints against commenting in any way (gag orders, etc).

Thus, if BellSouth and Verizon "cannot confirm or deny" NSA snooping in the literal sense of, "we're legally constrained from commenting", then bingo, they've got a relationship with the NSA. If they had no relationship, there would be no constraint, and they would deny the allegations as loudly as possible, as Qwest has done.

When they do that, they'll get their retractions.

High performance access to file storage

Next page: Related stories

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.