Big Data

The NSA and Big Data

While your company may not be subjected to the global scrutiny befalling the NSA and U.S. intelligence gathering apparatus, the "Big Snooping" capabilities engendered by Big Data must be used in a clearly delineated and responsible manner.

IT used to be a relatively benign and controversy-free field, but recent events have technologies like Big Data hitting front-page news around the world. Recently, a government contractor revealed that one of the US intelligence organizations, the NSA, was capturing metadata of every phone call that transited US-based switching networks, creating a firestorm of controversy. Big Data suddenly became a household phrase as the technology was repeatedly cited as making this level of data capture and analysis possible.

Opponents of the program cited privacy concerns; if the US government could track the source, destination, and duration of every phone call, as well as the originating device and cell tower, it amounted to reporting to the government where you went, to whom you were talking, and the frequency of conversations with certain individuals. Despite assurances that the content of calls was not monitored, the data gathered were arguably intrusive and in violation of US privacy protections.

Interestingly, proponents of the program used arguments that would be familiar to anyone who has observed the PR response of a private company run through the press wringer for capturing intrusive data on its customers. Government representatives from the President down argued that this program had been disclosed, much like the fine print in a 10,000-line "Terms and Conditions" statement that users blindly agree to in order to use the service. Advocates of the NSA program also cited its benefits in a fashion that would make a social media company's PR spin master proud: human lives were saved (although, unfortunately, no one can provide the "top secret" details).

Like many a tool, just because a powerful capability exists doesn't mean it should be used everywhere and with complete impunity. As companies deploy Big Data, it's easy to capture every iota of data available and rest easy, assuming that the lawyers have covered all the bases in their mercurial Ts and Cs, and that users are knowingly surrendering all their personal information in order to use the fantastic service you've provided.

In theory, government is significantly more transparent than most private companies, with elected officials protecting the interests of constituents and "customers" having a direct ability to change policy and ultimately throw "management" out the door at election time. The visceral reaction to the NSA Big Data program demonstrates the peril of capturing and aggregating sensitive information in relative secret, even if the program has been legally "disclosed."

A public that may have been blissfully unaware of the capabilities of Big Data has now been shown its vast reach and analytical abilities. Rather than assuming users are aware of what you're capturing and are chomping at the bit for you to offer more finely targeted advertising and customer segmentation, why not disclose your data gathering activities in plain terms and highlight how those data are used and what benefits the customer can expect. "Transparency" has become overused to the point where it's meaningless, but it's obviously not an 80-page "privacy policy" or other legal self-indulgence.

While your company may not be subjected to the global scrutiny befalling the NSA and US intelligence gathering apparatus, the "Big Snooping" capabilities engendered by Big Data must be used in a clearly delineated and responsible manner. An increasingly savvy public is expecting to know how their behaviors and data are being monitored, measured, and sold. Disclosing this information and how it benefits customers can be a competitive differentiator, capturing customers who flee less transparent competitors.


Patrick Gray works for a global Fortune 500 consulting and IT services company and is the author of Breakthrough IT: Supercharging Organizational Value through Technology as well as the companion e-book The Breakthrough CIO's Companion. He has spent ...


Yes, unsolicited use of Big Data is indeed scary, although in truth we shouldn't be too much surprised that an agency with all the financial backing of a government has come up with something for their use which we have already come to expect from Amazon ("other people have also purchased..."), Google or Facebook.

An open communications strategy about what a company does with the data entrusted to it by it's customers should indeed be undisputed practice. However, at least in some cases this may raise some unexpected issues: What, if your company holds a lot of customer data (such as many of the telecom operators do) and does NOT make any use of it? Who has not experienced lousy service in a shop because they did not know anything about you as a customer and your usage of their services? Wouldn't a statement of "We do not use our customer data" imply the underlying message "We are simply not capable of managing this amount of data" or even worse "We have no clue on how to turn this into our advantage"?


I wonder how many people are being labelled terrorists because they called someone who called someone who called someone who may have been involved in a 'terrorist' scheme

Reality Bites
Reality Bites

Like all things federal, run by traitors or criminals and parasitic in nature. NSA hasn't stopped even a single attack, not a single rape, not a single murder, not a thing, just a 100% waste of money like everything federal gov. Fed = stupid, ignorant and parasitic in nature.


I wouldn't mind so much if "they" were paying us for the data they have/get on us. I mean the mega-marketers that will be supposedly tailoring our spam. Something like how the Googles make their money, ya know?

GSG moderator

ITIL stands for Information Technology Infrastructure Library and is a set of practices for IT Service Management (ITSM). It was developed by the British Government in the 80s. There is a whole path of certification starting with the ITIL Foundation exam.

Editor's Picks