Court Briefly Returns NSA Surveillance Program

nsa05232015getty.jpg?itok=vFc9WZB-

A US federal court has made an order that the National Security Agency can resume the bulk collection of American’s phone records for roughly five months as the program is phased out.

Under the recent law aimed at ending the surveillance program, the USA Freedom Act, the government has a six-month transition period in which to continue collecting phone records.
In an order published by National Journal, a Foreign Intelligence Surveillance Court judge said that the program could continue for the remainder of that transition period.

“This application presents the question whether the recently-enacted USA FREEDOM Act, in amending Title V of FISA, ended the bulk collection of telephone metadata,” Judge Michael W. Mosman wrote.

“The short answer is yes. But in doing so, Congress deliberately carved out a 180-day period following the date of enactment in which such collection was specifically authorized.”

The ruling was in response to a government request to continue the program.

“The government respectfully submits that it may seek and this court may issue an order for the bulk production of tangible things,” the Justice Department said in a memo less than an hour after the USA Freedom Act was signed into law earlier this month.

The Justice Department and the office of the Director of National Intelligence confirmed the resumption of the metadata program in a statement but noted that it moves forward for the remaining transition period under new restrictions instituted in 2014 after a push by President Obama.

"During the transition period, absent a true emergency, telephony metadata can only be queried after a judicial finding that there is a reasonable, articulable suspicion that the selection term is associated with an approved international terrorist organization," the statement says. "In addition, the query results must be limited to metadata within two hops of the selection term instead of three."

The American Civil Liberties Union indicated it would push back against the ruling. “Neither the statute nor the Constitution permits the government to subject millions of innocent people to this kind of intrusive surveillance," said Deputy Legal Director Jameel Jaffer. "We intend to ask the Second Circuit to prohibit the surveillance and to order the NSA to purge the records it's already collected."

Former Virginia Attorney General Ken Cuccinelli, in consort with FreedomWorks, briefed the surveillance court on concerns raised by the government’s application to continue the program. Under the new law, the court will have a panel of experts to consult on controversial privacy cases — but that body hasn’t been created yet.

The passage of the USA Freedom Act marked the zenith of a debate over the program sparked by revelations about its existence and scope from leaker Edward Snowden.
The Hill: http://bit.ly/1JBl1qP

« Europol Tackles Cybercrime Ring
Merkel Bugged While Pondering Greece Crisis »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Verizon

Verizon

Verizon is a leader in IT technology solutions - Verizon Cloud, Networking, Security, Mobility, Machine-to-Machine (M2M), Advanced Communications and Professional Services.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Digital Security Authority (DSA)

Digital Security Authority (DSA)

The establishment of the Digital Security Authority, which incorporates the National CSIRT, is crucial to significantly raising the cybersecurity posture and capabilities of Cyprus.

ThoughtSol

ThoughtSol

Thoughtsol help brands grow through Digital Transformation enabling them to leverage the power of IT for an all-embracing impact on their businesses.