Court Briefly Returns NSA Surveillance Program

nsa05232015getty.jpg?itok=vFc9WZB-

A US federal court has made an order that the National Security Agency can resume the bulk collection of American’s phone records for roughly five months as the program is phased out.

Under the recent law aimed at ending the surveillance program, the USA Freedom Act, the government has a six-month transition period in which to continue collecting phone records.
In an order published by National Journal, a Foreign Intelligence Surveillance Court judge said that the program could continue for the remainder of that transition period.

“This application presents the question whether the recently-enacted USA FREEDOM Act, in amending Title V of FISA, ended the bulk collection of telephone metadata,” Judge Michael W. Mosman wrote.

“The short answer is yes. But in doing so, Congress deliberately carved out a 180-day period following the date of enactment in which such collection was specifically authorized.”

The ruling was in response to a government request to continue the program.

“The government respectfully submits that it may seek and this court may issue an order for the bulk production of tangible things,” the Justice Department said in a memo less than an hour after the USA Freedom Act was signed into law earlier this month.

The Justice Department and the office of the Director of National Intelligence confirmed the resumption of the metadata program in a statement but noted that it moves forward for the remaining transition period under new restrictions instituted in 2014 after a push by President Obama.

"During the transition period, absent a true emergency, telephony metadata can only be queried after a judicial finding that there is a reasonable, articulable suspicion that the selection term is associated with an approved international terrorist organization," the statement says. "In addition, the query results must be limited to metadata within two hops of the selection term instead of three."

The American Civil Liberties Union indicated it would push back against the ruling. “Neither the statute nor the Constitution permits the government to subject millions of innocent people to this kind of intrusive surveillance," said Deputy Legal Director Jameel Jaffer. "We intend to ask the Second Circuit to prohibit the surveillance and to order the NSA to purge the records it's already collected."

Former Virginia Attorney General Ken Cuccinelli, in consort with FreedomWorks, briefed the surveillance court on concerns raised by the government’s application to continue the program. Under the new law, the court will have a panel of experts to consult on controversial privacy cases — but that body hasn’t been created yet.

The passage of the USA Freedom Act marked the zenith of a debate over the program sparked by revelations about its existence and scope from leaker Edward Snowden.
The Hill: http://bit.ly/1JBl1qP

« Europol Tackles Cybercrime Ring
Merkel Bugged While Pondering Greece Crisis »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

Cydome

Cydome

Cydome offers full-spectrum cybersecurity solutions tailored for the maritime industry.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

SANS CyberStart

SANS CyberStart

SANS CyberStart is a unique and innovative suite of tools and games designed to introduce children and young adults to the field of cyber security.

e-Crime Bureau

e-Crime Bureau

e-Crime Bureau is a specialized company offering cyber/computer forensics, cyber security consulting services, forensic audit and investigations services and training to clients across Africa.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Rezonate

Rezonate

Rezonate discovers, profiles, and protects Identities and their entire access journey to cloud infrastructure and critical SaaS applications. Preventing and stopping cyberattacks.

Lyvoc

Lyvoc

Lyvoc is a premier cybersecurity integration partner renowned for its expertise in supporting its clients to accelerate and secure their digital transformation.

Prowler

Prowler

Prowler is at the forefront of the Open Cloud Security movement, championing a new era of transparency, customizability, and community-driven security for cloud environments.