NSA Snooping - So what?
Recently, it was revealed that the NSA was snooping on a lot of emails and phone calls even from people within this country. For most of us, that snooping isn't a big deal. However, for nearly every corporate security officer, the news brought a major headache. If the NSA can get at our business emails, read our databases out in the cloud, and listen in on our phone calls, so can a well financed competitor. The risks are huge.The problem isn't the NSA snooping. The problem is that the NSA has placed "backdoors" into nearly every public email service, cloud provider, VIOP phone service, etc. controlled by a US company. A number of technical experts recently wrote, "The reality is that backdoors and covert access mechanisms are fragile and often exploitable by organized criminals, hackers, and the military and intelligence services of other governments." Anything that has a "backdoor" is not secure. If the NSA can get to it, so can someone else. Government mandated "backdoors" in other countries are already being used by criminals.
If a system is built with a data access that is supposed to be used only for special purposes, that access will be used by some unauthorized person for another purpose. That is true of every software ever written. If you want some data to be secret, do not have a path where it can be accessed.
Recently, Groklaw, a blog on law, shut down. The founder stated that the blog relied on email and lawyers have a requirement to keep their communications secret. With the revelations about NSA snooping, the founder came to the conclusion that there was no way to continue to operate. The revelations have shown that nearly any public email service does not meet the privacy requirements of lawyers. Those email services that had sufficient encryption to have good privacy such as Lavabit and Silent Mail have shut down. Nearly every layer of the email protocol has problems.
The discussion of how Google, Microsoft, and others are providing access to the NSA for snooping means that every cloud implementation out there is suspect (as well as all the network switches).
One more time, American businesses are being warned that the only proper way to plan for data security is to plan for the storage to be "hacked". Unfriendly people will get into your data. Now, what plans do you need to make to deal with it?
Some plans are: encrypt everything that will go to a public server. All email going in and out of the US will be read. Those emails that are encrypted will be saved hoping that the NSA will be able to break the encryption later. Use as long of a key on the encryption that you can. It is better to use third party, open source encryption software than anything provided by a major commercial enterprise as the NSA is supposed to have "back doors" into the encryption software provided by major commercial enterprises.