P27 Layout 1

Total Page:16

File Type:pdf, Size:1020Kb

P27 Layout 1 WEDNESDAY, JANUARY 22, 2014 technology Carphone Warehouse sales get 4G boost LONDON: Carphone Warehouse, and Vodafone started services in within the market,” he said, noting that of growth of 2 percent and second quar- ance for headline earnings per share of Europe’s biggest independent mobile August last year. growing penetration of 4G was also driv- ter like-for-like growth of 3.6 percent. 17-20 pence, up from 12.3 pence in the phone retailer, beat consensus forecasts Take-up of 4G is being driven by rock- ing a rise in incremental average revenue CPW UK like-for-like revenue rose 5 2012-13 year. It also reiterated guidance for third-quarter revenue growth at its eting demand for mobile data. “There is a per user (ARPU). percent during the quarter, building on for pro-forma headline earnings before main CPW Group business, helped by real willingness for customers to move to Shares in Carphone, up over a quarter growth of 16 percent in the same period interest and tax (EBIT) of 140-160 million growing sales of 4G superfast mobile 4G and a willingness for them to under- in the last year, rose 1.4 percent after the last year. The firm said its Virgin Mobile pounds ($230-263 million) for CPW broadband products. stand that data usage is going to go up in firm said sales at CPW Group stores open France joint venture maintained its post- Group. Mobile operator EE, a joint venture the future,” Carphone Chief Executive over a year rose 3.1 percent in the three pay customer base at 1.33 million, Carphone shares were up 3 pence at between Frances’ Orange and Deutsche Andrew Harrison told Reuters yesterday. months to Dec 28. That was a sixth though revenue fell 15.6 percent reflect- 282.5 pence at 0846 GMT, giving a mar- Telekom, launched 4G into Britain in “This time next year we should be look- straight quarter of like-for-like growth. It ing a declining overall market. ket capitalisation of about 1.6 billion late 2012, while rivals Telefonica’s O2 ing at quite a significant deployment compared to analysts’ consensus forecast Carphone reiterated its full-year guid- pounds. — Reuters In China, US tech firms weigh ‘Snowden Effect’ ‘American IT firms on the offensive’ BEIJING: Battling a perfect storm of government suspicion and pricing probes in China, US technology com- panies are having to re-think how they sell hardware and services in the world’s second-biggest economy. US multinationals, including IBM, Cisco Systems and Qualcomm, are looking to settle price-gouging inves- tigations and restore trust with Chinese regulators in the wake of reports that US government agencies directly collect data and tap networks of the biggest domestic technology companies. All US IT firms are “on the defen- sive” in China, said Scott Kennedy, director of the Research Center for Chinese Politics and Business at Indiana University. “They are all under LG to launch curved suspicion as either witting or unwit- ting collaborators in the US govern- ment’s surveillance and intelligence In this image made from video released by WikiLeaks on Friday, former gathering activities.” National Security Agency systems analyst Edward Snowden speaks during a smartphone in Europe Former National Security Agency presentation ceremony for the Sam Adams Award in Moscow, Russia. — AP (NSA) contractor Edward Snowden’s Beijing, alongside China’s drive to pro- them from an important source of revelations about US government sur- mote indigenous champions and the political support and business, and SEOUL: South Korea’s LG Electronics said yesterday it United States by the end of March. LG, the world’s fourth- veillance may cost US technology deep ties between big US tech firms perhaps put them in violation of the would start selling its first curved-screen smartphone- largest smartphone maker, did not provide any pricing firms billions of dollars in lost sales, and the government, further compli- (US) Patriot Act or some secret execu- seen as a first step to fully flexible products-in Europe next details. Curved screens are still at a nascent stage in dis- analysts say. The US cloud computing cate the outlook. On Saturday, China’s tive order.” month . play technology, which is shifting towards flexible panels industry alone may lose as much as Commerce Ministry condemned the IBM may address official concerns The “G-Flex” was introduced in Seoul in October and that are bendable or can even be rolled or folded. $35 billion in worldwide sales over the $1.1-trillion spending passed by the by rolling out more technologies and will hit stores in some 20 European nations, including Handset makers including Samsung have launched next three years, the Information US Congress last week for including a services. Last month, IBM announced France, Germany, Britain and Sweden, the firm said in a curved-screen smartphones recently as they seek to stoke Technology & Innovation Foundation cyber-espionage review process for it was expanding its enterprise cloud statement. consumer interest in the increasingly saturated market (ITIF), a Washington, DC-based non- federal purchases of technology from platform into China as part of a $1.2 The G-Flex is curved on the vertical axis of the handset, with a new technology. Samsung launched its first curved profit think-tank, estimates. “The abili- China. billion global initiative. That followed which LG says offers a more immersive viewing experience smartphone-the Galaxy Round-in October to a tepid ty of US companies to sell abroad has Cisco Systems, which is locked in a Amazon.com Inc’s announcement and fits the contour of the face. LG said the new phone- reception from consumers disappointed by the largely been seriously compromised by for- commercial battle to sell telecoms already available in Asia-would also be introduced in the experimental device. — AFP that Amazon Web Services would eign customer concerns about the network equipment with Chinese launch its own cloud computing serv- relationship between the US intelli- domestic competitor Huawei ices in China. gence community and the tech sec- Technologies, reported China orders Amazon said it signed a technical tor,” said Daniel Castro, a senior ana- declined 18 percent last quarter, as deal with the Beijing city government Canon top among Japanese firms in US lyst at ITIF. top-five emerging market sales and with the government of Ningxia, th Nowhere is the so-called ‘Snowden slumped by more than a fifth. “I’ve an autonomous region, “to help foster patents ranking for 9 consecutive year Effect’ expected to have greater never seen that fast a move in emerg- development of a robust IT sector in impact than in China, says Sanford C. ing markets,” said Cisco CEO John western China.” DUBAI: Canon Middle East announced that its parent acquisition of patent rights in accordance with the man- Bernstein analyst Toni Sacconaghi. “US Chambers. company, Canon Inc, world-leader in imaging solutions, agement direction of the Canon Group and technology technology companies face the most IBM also is reportedly in talks with China’s Lenovo Group Ltd to sell its again ranked first among Japanese companies and third trends while conducting thorough pre-application revenue risk in China by a wide mar- Quandary overall for the number of US patents awarded in 2013, searches to raise the quality of applications. Through gin, followed by Brazil and other For Qualcomm and InterDigital Inc, low-end server business, a move that according to the latest ranking of preliminary patent close cooperation between Canon’s technology and emerging markets,” he wrote in a which face anti-monopoly investiga- “may cool things down,” said Alberto results issued by IFI CLAIMS Patent Services on January intellectual property divisions, the company aims to research note this month. tions by China’s top planning agency, Moel, a Hong Kong-based analyst at 14, 2014. improve its technological the National Development and Reform Sanford C. Bernstein. On Friday, US Canon Inc actively pro- capabilities while further Earnings impact Commission, related to their patent President Barack Obama proposed motes the globalization of its enhancing its intellectual IBM, which reported a 22 percent licenses for wireless mobile handsets making changes to the NSA, without business and places great property rights. drop in third-quarter China sales, led and networks, the challenges may be addressing the government’s unau- value on obtaining patents Canon has ranked in by a 40 percent decline in hardware greater. Qualcomm CEO Paul Jacobs thorized access to company systems overseas, carefully adhering the top five patent holders revenues, may be a bellwether for the said earlier this month the company and technologies. to a patent-filing strategy for 28 consecutive years. ‘Snowden Effect’ when it reports was still in the dark on developments in That may not be enough for US that pursues patents in essential countries and regions Canon is a world-leading innovator and provider of fourth-quarter results later yesterday. the China probe, which the company tech firms. “The president’s speech was while taking into consideration the business strategies imaging and information technology solutions for indi- Revenue at the Armonk, NY-based announced in November. Qualcomm, empathetic, balanced and thoughtful, and technology and product trends unique to each loca- viduals and businesses. Canon provides both individual company is expected to contract 3.7 the leading provider of handset but insufficient to meet the real needs tion. Among these, the United States, with its many high- products and complete networked technology solutions percent in October-December from a chipsets for 4G networks, reports its of our globally connected world and a tech companies and large market scale, represents a par- for information input, management and output.
Recommended publications
  • D1.5 Final Business Models
    ITEA 2 Project 10014 EASI-CLOUDS - Extended Architecture and Service Infrastructure for Cloud-Aware Software Deliverable D1.5 – Final Business Models for EASI-CLOUDS Task 1.3: Business model(s) for the EASI-CLOUDS eco-system Editor: Atos, Gearshift Security public Version 1.0 Melanie Jekal, Alexander Krebs, Markku Authors Nurmela, Juhana Peltonen, Florian Röhr, Jan-Frédéric Plogmeier, Jörn Altmann, (alphabetically) Maurice Gagnaire, Mario Lopez-Ramos Pages 95 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Abstract The purpose of the business working group within the EASI-CLOUDS project is to investigate the commercial potential of the EASI-CLOUDS platform, and the brokerage and federation- based business models that it would help to enable. Our described approach is both ‘top down’ and ‘bottom up’; we begin by summarizing existing studies on the cloud market, and review how the EASI-CLOUDS project partners are positioned on the cloud value chain. We review emerging trends, concepts, business models and value drivers in the cloud market, and present results from a survey targeted at top cloud bloggers and cloud professionals. We then review how the EASI-CLOUDS infrastructure components create value both directly and by facilitating brokerage and federation. We then examine how cloud market opportunities can be grasped through different business models. Specifically, we examine value creation and value capture in different generic business models that may benefit from the EASI-CLOUDS infrastructure. We conclude by providing recommendations on how the different EASI-CLOUDS demonstrators may be commercialized through different business models. © EASI-CLOUDS Consortium. 2 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Table of contents Table of contents ...........................................................................................................................
    [Show full text]
  • Online Anonymity Islamic State and Surveillance
    online anonymity islamic state and surveillance Jamie Bartlett Alex Krasodomski-Jones March 2015 Open Access. Some rights reserved. As the publisher of this work, Demos wants to encourage the circulation of our work as widely as possible while retaining the copyright. We therefore have an open access policy which enables anyone to access our content online without charge. Anyone can download, save, perform or distribute this work in any format, including translation, without written permission. This is subject to the terms of the Demos licence found at the back of this publication. Its main conditions are: . Demos and the author(s) are credited . This summary and the address www.demos.co.uk are displayed . The text is not altered and is used in full . The work is not resold . A copy of the work or link to its use online is sent to Demos. You are welcome to ask for permission to use this work for purposes other than those covered by the licence. Demos gratefully acknowledges the work of Creative Commons in inspiring our approach to copyright. To find out more go to www.creativecommons.org Partners Credits Commissioned by? Published by Demos March 2015 © Demos. Some rights reserved. Third Floor Magdalen House 136 Tooley Street London SE1 2TU [email protected] www.demos.co.uk 2 INTRODUCTION This is a very short discussion paper about the way in which terrorist groups, and specifically Islamic State, use modern encryption systems to evade surveillance. It examines how the risks of online anonymity are weighed against its many social, personal and economic benefits.
    [Show full text]
  • National Insecurity: the Impacts of Illegal Disclosures of Classified Information
    National Insecurity: The Impacts of Illegal Disclosures of Classified Information MARK D. YOUNG* There had never been anything like it. In today's terms, it was as if an NSA employee had publicly revealed the complete communications intelligence operations of the Agency for the past twelve years-all its techniques and major successes, its organizational structure and budget-and had, for good measure, included actual intercepts, decrypts, and translations of the communications not only of our adversaries but of our allies as well.' In the mid-summer of 2013, the British newspaper, The Guardian, published claims by a contractor for the National Security Agency (NSA), that millions of telephone records were being collected under an order from the Foreign Intelligence Surveillance Court. Throughout the summer and fall, additional disclosures about apparent surveillance operations seized headlines around the world. Accurately interpreting the meaning of the disclosures has been more complicated, but it is clear that there is great public interest in United States intelligence activities. *Mark D. Young is the Senior Vice President and Chief Strategy Officer of National Security Partners, LLC. Previously he served as the Executive Director for the Directorate of Plans and Policy at United States Cyber Command, the Special Counsel for Defense Intelligence for the House Permanent Select Committee on Intelligence, and as a senior leader at the National Security Agency. The views expressed in this article are those of the author and do not reflect the official policy or position of the U.S. government. This article is derived entirely from open source material and contains no classified information.
    [Show full text]
  • Maintaining Corporate Privacy in the Digital Age
    Maintaining Corporate Privacy in the Digital Age Securing sensitive data while in motion and at rest Introduction Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise mobility initiatives to grow their businesses and increase operating efficiency. However, Ovum is concerned that corporate information security management policies do not appear to be adapting quickly enough to cope with the tumultuous rate of change imposed by the rapidly evolving business and technological landscape. Although encryption has been around for many years, it has come to the fore recently as a means of making it more difficult to gain unauthorized access to sensitive or confidential information, especially within the context of mobile devices. Ovum expects the adoption of encryption technologies to grow rapidly in the near term due to the fact that conventional approaches to information security are failing to stem the flow of data leakage incidents and privacy breaches. Eventually, all data will be encrypted at rest and/or in motion. However, for a variety of technical, practical, and legislative reasons, organizations must be diligent and meticulous in their use of this technology, with the customer and employee experience being of paramount importance. Companies can prioritize the encryption of corporate data by carrying out a data classification exercise across their business processes and IT infrastructure. However, data classification is a resource-intensive and generally costly process. Not only is it time- and resource-consuming to implement a manual classification in the first place, but it also requires employees to be aware of changing classification policies going forward, and to potentially apply them to information and data items that they have already created and distributed.
    [Show full text]
  • Reframing the Crypto Wars
    CONTENTS Introduction 1 A Highlights Reel of the U.S. Encryption Debate 2 The Early “Crypto Wars” and the Clipper Chip 2 The Encryption Debate Sequel: Snowden and Surveillance 3 Privacy and the Encryption Debate 3 Earn It: Encryption Controversy Over Section 230 3 The Current International Debate Around Encryption 4 The Impact of International Encryption Policy on Domestic Policy 5 Security Versus Privacy or Security Versus Security 5 Challenges to Making Progress on the Encryption Debate 6 The Increased Availability of User-friendly Encryption Services 6 A Lack of a Common Language 6 A Lack of a Whole of Government Approach to Cybersecurity 7 Disagreement About Backdoor Alternatives 8 Conclusion 9 About the Authors 10 R STREET POLICY STUDY NO. 237 The debate was seemingly set to be answered by the courts in July 2021 2016, when Apple refused to craft new software at the behest of the Federal Bureau of Investigation (FBI) that would allow the agency to access encrypted information on a phone belonging to one of the shooters in a 2015 terrorist attack on Inland Regional Center in San Bernardino, California. REFRAMING THE CRYPTO WARS But the “going dark” encryption debate shares a key charac- By Kathryn Waldron and Sofia Lesmes teristic with the walking dead: no matter how many times you try to put it to rest, it keeps coming back. In October 2020, the Department of Justice (DOJ) issued an international INTRODUCTION statement calling for companies to “[e]nable law enforce- ment access to content in a readable and usable format where or the past several decades, policymakers, law enforce- authorisation is lawfully issued, is necessary and proportion- ment, private companies, civil liberties advocates and ate, and is subject to strong safeguards and oversight.”2 Both cybersecurity specialists have been locked in a pas- at home and abroad, there are increased government calls to sionate yet seemingly unending battle over encryp- weaken encryption in the name of national security.
    [Show full text]
  • Navigating the Digital Age: the Definitive Cybersecurity Guide For
    THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS NAVIGATING THE DIGITAL AGE: The Defi nitive Cybersecurity Guide for Directors and Offi cers Published by Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers Publisher: Tim Dempsey Editor: Matt Rosenquist Design and Composition: Graphic World, Inc. Printing and Binding: Transcontinental Printing Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers is published by: Caxton Business & Legal, Inc. 27 North Wacker Drive, Suite 601 Chicago, IL 60606 Phone: +1 312 361 0821 Email: [email protected] First published: 2015 ISBN: 978-0-9964982-0-3 Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers © October 2015 Cover illustration by Tim Heraldo Copyright in individual chapters rests with the authors. No photocopying: copyright licenses do not apply. DISCLAIMER Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers (the Guide) contains summary information about legal and regulatory aspects of cybersecurity governance and is current as of the date of its initial publication (October 2015). Although the Guide may be revised and updated at some time in the future, the publishers and authors do not have a duty to update the information contained in the Guide, and will not be liable for any failure to update such information. The publishers and authors make no representation as to the completeness or accuracy of any information contained in the Guide. This guide is written as a general guide only. It should not be relied upon as a substitute for specifi c professional advice.
    [Show full text]
  • Feature Article
    FEATURE ARTICLE PRIVACY VS. PUBLIC SAFETY: PROSECUTING AND DEFENDING CRIMINAL CASES IN THE POST-SNOWDEN ERA Jason M. Weinstein, William L. Drake, and Nicholas P. Silverman* I. INTRODUCTION ....................................... 729 II. PRIVACY VS.PUBLIC SAFETY—THE BATTLEGROUNDS ............ 732 A. Pushback from the Courts .......................... 732 1. Search Warrants for Seized Devices and Email Accounts.................................... 733 2. Searches of Cellphones Incident to Arrest............ 736 3. Use of Cell Tower Records ...................... 738 4. Cell Site Simulators............................ 741 B. Pushback from Providers........................... 743 1. Apple and Google Adopt New Encryption Policies ..... 744 2. Jurisdictional Challenges to Search Warrants......... 746 3. Less Cooperation, More Confrontation.............. 748 C. The Politics of Privacy on the Hill .................... 748 II. CHALLENGES FOR PROSECUTORS,OPPORTUNITIES FOR DEFENSE LAWYERS .......................................... 750 III. WHAT’S NEXT?...................................... 750 IV. CONCLUSION ........................................ 752 I. INTRODUCTION Over the past several years, there have been signs that federal courts at all levels—from magistrates to the Supreme Court—are increasingly struggling with the privacy implications of evidence-gathering in the digital age. Judicial discom- fort with certain law enforcement techniques was already simmering well before anyone ever heard of Edward Snowden, but it only intensified after
    [Show full text]
  • How Much Is Too Much?
    LINCOLN MEMORIAL UNIVERSITY LAW REVIEW __________________________________ VOLUME 3 FALL 2015 _____________________________________ THE NSA’S EAVESDROPPING OPERATIONS AFTER THE SNOWDEN REVELATIONS: HOW MUCH IS TOO MUCH? JANUARY 2015 SYMPOSIUM TRANSCRIPT James Bamford MR. JACOB BAGGETT: I have the pleasure of introducing Mr. James Bamford as our first speaker. Mr. Bamford is an award-winning journalist in the field of national security. The New York Times calls him the nation's premier journalist on the subject of the NSA. And his most recent book, "The Shadow Factory", which is on sale outside by Union Avenue Books, was named by the Washington Post as one of the best books of the year. And he's here to discuss the transformation of the NSA since September 11th. Please welcome Mr. Bamford. (Applause) MR. JAMES BAMFORD: Thanks very much. It's really great being here. I want to thank Matt Lyon and Melanie Reid, Jacob Baggett, and Lauren Mullins for taking really great care of me. It's really great being here. The fact that this university is named after NSA AFTER SNOWDEN 116 President Lincoln is really quite an honor for me because I've always admired one of the things he's said. And that is the quote he has up here. I think if he had been President about a dozen years ago, we might not have gotten into the war in Iraq. If you read his quote there, "[k]ings had always been involving and impoverishing their people in wars, pretending generally, if not always, that the good of the people was the object."1 He was very much against attacking countries without getting congressional approval.
    [Show full text]
  • Surveillance After Snowden: Effective Espionage in an Age of Transparency By: Robin Simcox ISBN 978-1-909035-18-8
    SURVEILLANCE AFTER SNOWDEN Effective Espionage in an Age of Transparency Robin Simcox Published in 2015 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society 2015 The Henry Jackson Society All rights reserved The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees. Title: Surveillance after Snowden: Effective Espionage in an Age of Transparency By: Robin Simcox ISBN 978-1-909035-18-8 £10.00 where sold All rights reserved Front Cover Image: Laura Poitras/Praxis Films (© wikimedia.org). www.istockphoto.com SURVEILLANCE AFTER SNOWDEN Effective Espionage in an Age of Transparency Robin Simcox www.henryjacksonsociety.org 5 SURVEILLANCE AFTER SNOWDEN Effective Espionage in an Age of Transparency Acknowledgments Many of those who agreed to speak to me in the course of this project cannot be named. They all have my thanks, as does Elliot Soward for his research assistance. Additional thanks to Richard Black, Samantha Feuer, Mark Finegold, Oscar Isham, Livinia Mouries, Jeevan Vipinachandran, Chris Underwood and Quentin Wight. About the Author Robin Simcox is a Research Fellow at The Henry Jackson Society, where he works on terrorism and security issues. He has written for the likes of Foreign Affairs, Washington Post, Wall Street Journal, Los Angeles Times, The Guardian, New Republic and The Atlantic; and comments in the media for the likes of the BBC, CNN, Sky News, al-Jazeera and Fox News.
    [Show full text]
  • Following Snowden, German Uncertainty About Monitoring
    Following Snowden, German uncertainty about monitoring Andrew A. Adams Centre for Business Information Ethics, Meiji University, [email protected] Sarah Hosell HMKW University of Applied Sciences, [email protected] Kiyoshi Murata Centre for Business Information Ethics, Meiji University, [email protected] Abstract. Purpose – As part of an international study of knowledge of and attitudes to Snowden's revelations about the activities of the NSA/GCHQ, this paper deals with Germany, taking its socio-cultural and political environment surrounding privacy and state surveillance into account. Design/methodology/approach – A questionnaire was answered by 76 German University students. The quantitative responses to the survey were statistically analysed as well as qualitative considerations of free text answers. Findings – Snowden’s revelations have had an important influence over German students’ attitudes toward privacy and state surveillance, and shows concerns over the privacy risks associated with Internet activity. Practical implications – The study results imply a need to build a collective awareness of the importance of the right to privacy and its responsibilities, the available technological options for individuals to exert their own privacy and security and the democratic means to agree and enforce appropriate legal restrictions on state surveillance. Social implications – Young Germans support Snowden's actions and would be more willing to emulate him in Germany than the US. While many believe that people must give up some privacy and freedom for security, few seem to believe that current US or German approaches are valid and justified. Originality/value – This study is the first attempt to investigate the social impact of Snowden’s revelations on German students’ attitudes toward privacy and state surveillance as part of cross-cultural analyses between eight countries.
    [Show full text]
  • The Snowden Effect Technology Is at the Center of Most U.S.-China Tensions Today
    The Snowden Effect Technology is at the center of most U.S.-China tensions today. Edward Snowdenʼs leaks helped put it there. By Eli Binder and Katrina Northrop — December 6, 2020 Illustration by Luis Grañena In March 2012, a 28-year-old federal contractor named Edward Snowden first reported to the National Security Agencyʼs Kunia Regional Security Operations Center on the Hawaiian island of Oahu. Though he would later hatch a complex plan to leak highly classified intelligence documents, Snowdenʼs original contract was for a straightforward task: detect and thwart Chinese hacking of U.S. government operations. The mission was urgent. Chinese cyber attacks against the U.S. were on the rise, and by the end of that year, attacks from China accounted for more than 40 percent of the worldʼs activity, according to a study by Akami Technologies. In the depths of the Kunia base — a decrepit former Navy Armory that NSA employees nicknamed “The Tunnel” — a team of NSA experts focused on what top defense officials had called “Chinaʼs cyber thievery.” By then, Snowden was well versed in Chinaʼs hacking operations. In 2010, when he worked at the NSAʼs Pacific Technical Center outside of Tokyo, he gave a training presentation on the China threat for U.S. intelligence employees. Danielle Massarini, the training organizer who had spent her entire career in Chinese counterintelligence, would later call Snowdenʼs session “without question the best cyber briefing on China intel weʼd ever had.”1 But along the way, Snowden grew increasingly disaffected with what he perceived to be the NSAʼs overreach.
    [Show full text]
  • The Pendulum Effect: Comparisons Between the Snowden Revelations and the Church Committee
    CORE Metadata, citation and similar papers at core.ac.uk Provided by MURAL Information- Maynooth University & Communications Research Archive Library Technology Law, 2014 Vol. 23, No. 3, 192–219, http://dx.doi.org/10.1080/13600834.2014.970375 The pendulum effect: comparisons between the Snowden revelations and the Church Committee. What are the potential implications for Europe? Maria Helen Murphy* Law Department, National University of Ireland, Maynooth, Ireland This article considers how the pendulum metaphor can be applied to shifts in popular opinion concerning the right to privacy. At times, the media portrays privacy as an individualistic right, serving at the behest of criminals and terrorists. Every so often, however, an event occurs that starkly reminds the public of the value of privacy. Public opinion drives debate and this debate often leads to legal reform. The Church Committee, formed in response to the Watergate scandal, is a classic example of the effect the exposure of abuse can have on the regulation of privacy. Over time, however, legislative gains in privacy protection have a tendency to erode. In addition, extreme events, such as the terrorist attacks of 9/11, can cause the pendulum to swing back to the opposite position. Following the exposure of mass surveillance practices by Edward Snowden, the world has, once again, been questioning government surveillance activities. This article seeks to consider the transatlantic impact of the National Security Agency revelations. Transparency is highlighted as a crucial regulating force on excessive government interference with privacy rights. Keywords: Snowden; surveillance; privacy; data retention; European Union Introduction The concept of a swinging pendulum frequently serves as a political metaphor, illustrat- ing oscillations from one policy position to another over time.1 The metaphor borrows from the scientific principle that the restoring force of gravity, combined with the mass of a pendulum, will cause it to swing back and forth indefinitely.
    [Show full text]