NSA’s Public Spying Revealed by Snowden Is Ruled Illegal.

fb-dem-clappervictory-1160x7501.png?w=100%25

The US Court of Appeals has ruled that the bulk collection of telephone metadata is unlawful. This is a landmark decision that clears the way for a full legal challenge against the National Security Agency.
    
A panel of three federal judges for the second circuit has overturned an earlier ruling that the controversial surveillance practice, first revealed to the US public by NSA whistleblower Edward Snowden in 2013, could not be subject to judicial review.

But the judges also waded into the charged and ongoing debate over the reauthorization of a key Patriot Act provision currently before US legislators. That provision, which the appeals court ruled the NSA program surpassed, will expire on 1 June amid gridlock in Washington on what to do about it.
The judges opted not to end the domestic bulk collection while Congress decides its fate, calling judicial inaction “a lesser intrusion” on privacy than at the time the case was initially argued.
“In light of the asserted national security interests at stake, we deem it prudent to pause to allow an opportunity for debate in Congress that may profoundly alter the legal landscape,” the judges ruled.
But they also sent a tacit warning to Senator Mitch McConnell, the Republican leader in the Senate who is pushing to re-authorize the provision, known as Section 215, without modification: “There will be time then to address appellants’ constitutional issues.”
“We hold that the text of section 215 cannot bear the weight the government asks us to assign to it, and that it does not authorize the telephone metadata program,” concluded their judgment.
“Such a monumental shift in our approach to combating terrorism requires a clearer signal from Congress than a recycling of oft‐used language long held in similar contexts to mean something far narrower,” the judges added.
“We conclude that to allow the government to collect phone records only because they may become relevant to a possible authorized investigation in the future fails even the permissive ‘relevance’ test.
“We agree with appellants that the government’s argument is ‘irreconcilable with the statute’s plain text’.”

Senator Rand Paul, a Republican presidential candidate who has made opposition to over-broad surveillance central to his platform, tweeted: “The phone records of law abiding citizens are none of the NSA’s business! Pleased with the ruling.”
The White House stressed that it too supported an overhaul of the program, though declined to comment on the blow to the NSA’s existing legal authority. But opponents in Congress were emphatic that the ruling represented a breakthrough in their fight to rein in executive overreach on surveillance.

“Today’s court decision reaffirms what I’ve been saying since the Snowden leaks came to light. Congress never intended Section 215 to allow bulk collection,” said Republican Jim Sensenbrenner.
“This program is illegal and based on a blatant misinterpretation of the law. It’s time for Congress to pass the USA Freedom Act in order to protect both civil liberties and national security with legally authorized surveillance.”

The American Civil Liberties Union, which led the initial legal challenge against director of national intelligence James Clapper, predicted that its victory should force Congress to take a tougher approach.
Leading reformers in the Senate also urged Senator McConnell to allow a vote on the reform-minded USA Freedom Act rather than attempt to simply update existing legislation when it expires in a few days time.
This process apparently brings Snowden’s legal position into question and some are asking if he is now guilty as NSA and others have said. And others have asked, ‘How do I keep my phone conversations free from surveillance”.
Nobody – not your mobile provider, your ISP, or the phone manufacturer – can promise you that your phone conversations won’t be intercepted in transit. That leaves end-to-end encryption – using a trustworthy app whose makers themselves literally cannot break the encryption – your best play.

Signal’s code is open source, meaning it can be inspected by experts, and the app also supports forward secrecy, so if an attacker steals your encryption key, they cannot go back and decrypt messages they may have collected in the past.

Using Signal and Red Phone means your voice conversations are always full scrambled. 

Other apps with encryption tend to enter insecure modes at unpredictable times, unpredictable for many users, at least. Apple’s iMessages, for example, employs strong encryption, but only when communicating between two Apple devices and only when there is a proper data connection. Otherwise, iMessages falls back on insecure SMS messaging. iMessages also lacks forward secrecy and inspectable source code.

Signal also offers the ability for power users to verify the identity of the people they’re talking to, confirming that the encryption isn’t under attack. With iMessage, you just have to take Apple’s word for it. 

Intercept: http://bit.ly/1cw1AV9
Guardian: http://bit.ly/1cHu52d

« How Mobility Is Revolutionising Manufacturing
Cyber Vulnerability - Get Your Report for 2015 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Pervade Software

Pervade Software

Pervade Software is a global provider of dedicated compliance tracking software with monitoring & reporting capabilities.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

WiSecure Technologies

WiSecure Technologies

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era.

Abacode

Abacode

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

ThreatLocker

ThreatLocker

The ThreatLocker Platform provides a Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

Gcore

Gcore

Gcore is an international leader in public cloud and edge computing, content delivery, hosting, and security solutions.