Feeds

John Kerry bombshell: 'Yes, the NSA... reached TOO FAR, inappropriately'

But the US Secretary of State remains defiant amid global surveillance outrage

Securing Web Applications Made Simple and Scalable

US Secretary of State John Kerry has issued a rare mea culpa on behalf of the US government and its NSA surveillance platforms.

Speaking at a panel discussion for the Open Government Partnership, Kerry said that in its efforts to thwart terrorists, the US had gone "too far" in its collection of personal data, but insisted that reports of massive data hoarding were untrue.

"I assure you, innocent people are not being abused in this process," Kerry said, "but there is an effort to gather information, and yes, in some cases it has reached too far, inappropriately."

"Our President is determined to clarify and is now doing a thorough review in order that nobody will have a sense of abuse."

Sentiment of such a "sense of abuse" has been rampant among both the domestic and international communities in recent days.

Earlier this week, a number of major providers, including Google and Yahoo, were found to have unwittingly supplied the government with some 180 million records via NSA surveillance programs.

The disclosure adds to an already hefty government data repository first uncovered with the revelation of the PRISM platform by whistleblower Edward Snowden, the now-infamous consultant living under asylum in Russia.

Further reports from the international community have suggested that the spying activities have also extended to the diplomatic arena, as reports out of Germany indicated that US agents may have tapped lines of communication used by government officials, including Chancellor Angela Merkel.

Even when fessing up to the use of heavy-handed tactics, Kerry remained defiant on the most recent reports, denying that tens of millions of people were having their data slurped through the NSA pipeline.

"There is a tremendous amount of exaggeration and misreporting in some of what is out there," he said.

"What we are trying to do is, in a random way, find ways of trying to learn if in fact there is a threat that we need to respond to." ®

Application security programs and practises

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.