Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Concerns of Fed Phone, Internet Surveillance Lead to Privacy Discussion

The NSA’s data collection has proven troubling, and many Americans’ privacy concerns grow.

By Bill Zalud
zalud feat
September 1, 2013

In a New York Times/CBS NewsPoll, a week after the Boston Marathon attack, which was unraveled after the release of video footage of the two suspects flushed them out of hiding, 78 percent of people said surveillance cameras were a good idea.

Recently, the headlines have been filled with news reports about the National Security Agency tracking cellular phone calls, email and Internet traffic. It appears the programs are legal and, when officials want to dig deeper, a special U.S. court considers and then issues warrants. This effort seems to have resonated differently with Americans and governments abroad relative to privacy.

 

Data Collection is Troubling

So it is not surprising that new figures from the quarterly Heartland Monitor Pollshow that most Americans exhibit a healthy amount of skepticism and resignation about data collection and surveillance, and show varying degrees of trust in institutions to responsibly use their personal information. Key findings of the poll on security versus privacy included a briefing by Rep. Marsha Blackburn (R-TN), a member of the Bipartisan Congressional Privacy Caucus and Jon Leibowitz, former chairman of the Federal Trade Commission.

The 17th quarterly Heartland Monitor Pollinvestigates American attitudes and opinions on the collection and use of their personal information by various groups and institutions and how “big data” affects their personal privacy. The poll asks Americans their impressions of the likelihood that their personal information is available to the government, businesses, individuals and other groups without their consent – and to what extent people believe they can control how much personal information is shared.

A full 85 percent of Americans believe their communications history, like phone calls, emails and Internet use, are accessible to the government, businesses and others. Two in three (66 percent) feel that they have little or no control over the type of information that is collected and used by various groups and organizations. Fifty-nine percent, meanwhile, feel that they are unable to correct inaccurate personal information.

 

Concerns Grow over National Security Measures

The survey finds that Americans are also divided on possible steps to improve national security, with just 10 percent supporting expanded government monitoring of phone and email activities. Rather, the public is more likely to favor increased use of camera surveillance of public places, with 44 percent supporting the measure, followed by 16 percent of respondents in favor of “increased censorship of Web sites and less freedom to access sources on the Internet.” However, 42 percent of respondents said they oppose all three options.

With respect to privacy in the future, nine in 10 poll respondents said they feel that they have less privacy than previous generations and expect the next generation will be even worse off. Meanwhile, a clear majority (88 percent) favors a federal policy to require the deletion of online information and nearly four in 10 (37 percent) report they have personally experienced fraudulent use of their personal information to make purchases without their consent.

When asked to weigh the relative benefits and drawbacks of personal data collection, Americans generally believe the practice has a mostly negative impact. More than half (55 percent) say the collection and use of information is “mostly negative” because the information can be collected and used in a way that can risk personal privacy, peoples’ safety, financial security and individual liberties. A minority (38 percent) believe it is “mostly positive” because more information can result in better decisions about how to improve the economy, grow businesses, provide better service and increase public safety.

Americans grant varying degrees of trust to different institutions when it comes to responsibly using their information.

The groups and institutions seen as most trustworthy to use information responsibly are those known to “do good” like healthcare providers (80 percent) and law enforcement (71 percent) and those with whom people have entered a close, collaborative arrangement like their employer (79 percent).

The government (48 percent), political parties (37 percent), and the media (29 percent) are on the low end of the spectrum in terms of trust. Given the recent headlines, the IRS is seen as trusted by just over half of Americans (53 percent), with a higher rating than the government (48 percent) as a whole.

The bottom line: People believe that security video is less intrusive than the collection, storage, mining and use of personal data; but they are more responsive to surveillance when in reference to terrorism and homeland security.   

KEYWORDS: big data data collection national security agency Phone record surveillance privacy concerns

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • location data

    DHS purchases of cell phone location data raise privacy concerns

    See More
  • orange vintage Volkswagen

    71% of drivers consider buying older cars due to data privacy concerns

    See More
  • facial recognition

    China to Require Facial ID for Citizens to Get New Phone Number, Use Internet

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing