recommended reading

Obama Establishes Big Data Privacy Panel as Part of NSA Reform

Obama has asked John Podesta to lead a comprehensive review of big data and privacy.

Obama has asked John Podesta to lead a comprehensive review of big data and privacy. // Eric Jamison/AP file photo

ARCHIVES

By Rebecca Carroll and Aliya Sternstein January 17, 2014

recent posts

President Obama on Friday announced major reforms to the National Security Agency, a response to revelations that the agency has been collecting massive amounts of data on nearly all U.S. citizens. Here's what he said about a new group he's tasked with reviewing privacy concerns in big data analysis.

I have also asked my counselor, John Podesta, to lead a comprehensive review of big data and privacy.  And this group will consist of government officials who, along with the President’s Council of Advisors on Science and Technology, will reach out to privacy experts, technologists and business leaders, and look how the challenges inherent in big data are being confronted by both the public and private sectors; whether we can forge international norms on how to manage this data; and how we can continue to promote the free flow of information in ways that are consistent with both privacy and security.  

For ultimately, what’s at stake in this debate goes far beyond a few months of headlines, or passing tensions in our foreign policy.  When you cut through the noise, what’s really at stake is how we remain true to who we are in a world that is remaking itself at dizzying speed.  Whether it’s the ability of individuals to communicate ideas; to access information that would have once filled every great library in every country in the world; or to forge bonds with people on other sides of the globe, technology is remaking what is possible for individuals, and for institutions, and for the international order.  So while the reforms that I have announced will point us in a new direction, I am mindful that more work will be needed in the future. 

...

As the nation that developed the Internet, the world expects us to ensure that the digital revolution works as a tool for individual empowerment, not government control.  Having faced down the dangers of totalitarianism and fascism and communism, the world expects us to stand up for the principle that every person has the right to think and write and form relationships freely -- because individual freedom is the wellspring of human progress.

The Electronic Frontier Foundation, a major critic of NSA's tactics, welcomed the new review. EFF opposes all bulk surveillance and seeks increased judicial oversight and assurances about the security of digital tools and encryption standars. "We're hopeful that the big data and privacy review commissioned by John Podesta will address these issues," EFF Legal Director Cindy Cohn said.

Rebecca Carroll

Before joining Government Executive’s editing team, Rebecca Carroll wrote and edited for The Associated Press in Washington, New York and Bangkok, and for National Geographic News. She also was a Peace Corps volunteer in China, where she returned to study at the Johns Hopkins-Nanjing University Center. She holds a bachelor’s degree from the University of Pennsylvania, with a double major in English and Philosophy.

Aliya Sternstein

Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.