Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Yahoo CEO Fears Defying NSA on Data Could Mean Prison

SAN FRANCISCO – Yahoo chief Marissa Mayer on Wednesday said she feared winding up in prison for treason if she refused to comply with US spy demands for data.

SAN FRANCISCO – Yahoo chief Marissa Mayer on Wednesday said she feared winding up in prison for treason if she refused to comply with US spy demands for data.

Her comments came after being asked what she is doing to protect Yahoo users from “tyrannical government” during an on-stage interview at a TechCrunch Disrupt conference in San Francisco.

Mayer said Yahoo scrutinizes and fights US government data requests stamped with the authority of a Foreign Intelligence Surveillance Court, but when the company losses battles it must do as directed or risk being branded a traitor.

Data requests authorized by the court come with an order barring anyone at the company receiving the request from disclosing anything about them, even their existence.

“If you don’t comply, it is treason,” Mayer said when asked why she couldn’t just spill details of requests by US spy agencies for information about Yahoo users.

“We can’t talk about it because it is classified,” she continued. “Releasing classified information is treason, and you are incarcerated. In terms of protecting our users, it makes more sense to work within the system.”

Yahoo, Google, Facebook, and Microsoft are among Internet firms pushing for permission to disclose more details to users about demands for data made in the name of fighting terrorism or other threats.

Technology titans have been eager to bolster the trust of its users by making it clearer what has actually been demanded by and disclosed to US authorities.

Advertisement. Scroll to continue reading.

“It is our government’s job to protect all of us and also protect our freedoms and protect the economy and protect companies,” said Facebook co-founder and chief Mark Zuckerberg said at TechCrunch Disrupt on Wednesday.

“Frankly, I think the government blew it.”

US intelligence officials declassified documents Tuesday revealing the National Security Agency violated privacy rules for three years when it sifted through phone records of Americans with no suspected links to terrorists.

The revelations raised fresh questions about the NSA’s ability to manage the massive amount of data it collects and whether the US government is able to safeguard the privacy of its citizens.

The government was forced to disclose the documents by a judge’s order after a Freedom of Information lawsuit filed by the Electronic Frontier Foundation, a non-profit group promoting digital privacy rights and free speech.

The foundation called the release of the documents a “victory” for transparency but intelligence officials said the papers illustrated how the spy service had made unintentional “mistakes” that were rectified under strict judicial oversight.

The release came after the scale of NSA spying was exposed in a series of bombshell media leaks in recent months by former US intelligence contractor Edward Snowden, who has been granted temporary asylum in Russia.

Documents divulged by Snowden have shown the NSA conducts a massive electronic dragnet, including trawling through phone records and online traffic, that has sometimes flouted privacy laws.

The declassified documents released on Tuesday shed light on friction between the NSA and the court, with judges castigating the agency for failing to abide by their orders and misrepresenting the nature of their data collection.

Related Reading: NSA Shares Raw Data About US Citizens With Israel

Related Reading: NSA Documents Show Spy Agency Violated Privacy Rules

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.