Court Briefly Returns NSA Surveillance Program

nsa05232015getty.jpg?itok=vFc9WZB-

A US federal court has made an order that the National Security Agency can resume the bulk collection of American’s phone records for roughly five months as the program is phased out.

Under the recent law aimed at ending the surveillance program, the USA Freedom Act, the government has a six-month transition period in which to continue collecting phone records.
In an order published by National Journal, a Foreign Intelligence Surveillance Court judge said that the program could continue for the remainder of that transition period.

“This application presents the question whether the recently-enacted USA FREEDOM Act, in amending Title V of FISA, ended the bulk collection of telephone metadata,” Judge Michael W. Mosman wrote.

“The short answer is yes. But in doing so, Congress deliberately carved out a 180-day period following the date of enactment in which such collection was specifically authorized.”

The ruling was in response to a government request to continue the program.

“The government respectfully submits that it may seek and this court may issue an order for the bulk production of tangible things,” the Justice Department said in a memo less than an hour after the USA Freedom Act was signed into law earlier this month.

The Justice Department and the office of the Director of National Intelligence confirmed the resumption of the metadata program in a statement but noted that it moves forward for the remaining transition period under new restrictions instituted in 2014 after a push by President Obama.

"During the transition period, absent a true emergency, telephony metadata can only be queried after a judicial finding that there is a reasonable, articulable suspicion that the selection term is associated with an approved international terrorist organization," the statement says. "In addition, the query results must be limited to metadata within two hops of the selection term instead of three."

The American Civil Liberties Union indicated it would push back against the ruling. “Neither the statute nor the Constitution permits the government to subject millions of innocent people to this kind of intrusive surveillance," said Deputy Legal Director Jameel Jaffer. "We intend to ask the Second Circuit to prohibit the surveillance and to order the NSA to purge the records it's already collected."

Former Virginia Attorney General Ken Cuccinelli, in consort with FreedomWorks, briefed the surveillance court on concerns raised by the government’s application to continue the program. Under the new law, the court will have a panel of experts to consult on controversial privacy cases — but that body hasn’t been created yet.

The passage of the USA Freedom Act marked the zenith of a debate over the program sparked by revelations about its existence and scope from leaker Edward Snowden.
The Hill: http://bit.ly/1JBl1qP

« Europol Tackles Cybercrime Ring
Merkel Bugged While Pondering Greece Crisis »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

PlaxidityX

PlaxidityX

PlaxidityX (formerly Argus Cyber Security) is a global leader in mobility cyber security, provides DevSecOps, vehicle protection and fleet protection technologies and services.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

At-Bay

At-Bay

At-Bay offer an end-to-end solution to cyber risk with comprehensive risk assessment, a tailored cyber insurance policy and year-long, active, risk-management service.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.