NSA’s Public Spying Revealed by Snowden Is Ruled Illegal.

fb-dem-clappervictory-1160x7501.png?w=100%25

The US Court of Appeals has ruled that the bulk collection of telephone metadata is unlawful. This is a landmark decision that clears the way for a full legal challenge against the National Security Agency.
    
A panel of three federal judges for the second circuit has overturned an earlier ruling that the controversial surveillance practice, first revealed to the US public by NSA whistleblower Edward Snowden in 2013, could not be subject to judicial review.

But the judges also waded into the charged and ongoing debate over the reauthorization of a key Patriot Act provision currently before US legislators. That provision, which the appeals court ruled the NSA program surpassed, will expire on 1 June amid gridlock in Washington on what to do about it.
The judges opted not to end the domestic bulk collection while Congress decides its fate, calling judicial inaction “a lesser intrusion” on privacy than at the time the case was initially argued.
“In light of the asserted national security interests at stake, we deem it prudent to pause to allow an opportunity for debate in Congress that may profoundly alter the legal landscape,” the judges ruled.
But they also sent a tacit warning to Senator Mitch McConnell, the Republican leader in the Senate who is pushing to re-authorize the provision, known as Section 215, without modification: “There will be time then to address appellants’ constitutional issues.”
“We hold that the text of section 215 cannot bear the weight the government asks us to assign to it, and that it does not authorize the telephone metadata program,” concluded their judgment.
“Such a monumental shift in our approach to combating terrorism requires a clearer signal from Congress than a recycling of oft‐used language long held in similar contexts to mean something far narrower,” the judges added.
“We conclude that to allow the government to collect phone records only because they may become relevant to a possible authorized investigation in the future fails even the permissive ‘relevance’ test.
“We agree with appellants that the government’s argument is ‘irreconcilable with the statute’s plain text’.”

Senator Rand Paul, a Republican presidential candidate who has made opposition to over-broad surveillance central to his platform, tweeted: “The phone records of law abiding citizens are none of the NSA’s business! Pleased with the ruling.”
The White House stressed that it too supported an overhaul of the program, though declined to comment on the blow to the NSA’s existing legal authority. But opponents in Congress were emphatic that the ruling represented a breakthrough in their fight to rein in executive overreach on surveillance.

“Today’s court decision reaffirms what I’ve been saying since the Snowden leaks came to light. Congress never intended Section 215 to allow bulk collection,” said Republican Jim Sensenbrenner.
“This program is illegal and based on a blatant misinterpretation of the law. It’s time for Congress to pass the USA Freedom Act in order to protect both civil liberties and national security with legally authorized surveillance.”

The American Civil Liberties Union, which led the initial legal challenge against director of national intelligence James Clapper, predicted that its victory should force Congress to take a tougher approach.
Leading reformers in the Senate also urged Senator McConnell to allow a vote on the reform-minded USA Freedom Act rather than attempt to simply update existing legislation when it expires in a few days time.
This process apparently brings Snowden’s legal position into question and some are asking if he is now guilty as NSA and others have said. And others have asked, ‘How do I keep my phone conversations free from surveillance”.
Nobody – not your mobile provider, your ISP, or the phone manufacturer – can promise you that your phone conversations won’t be intercepted in transit. That leaves end-to-end encryption – using a trustworthy app whose makers themselves literally cannot break the encryption – your best play.

Signal’s code is open source, meaning it can be inspected by experts, and the app also supports forward secrecy, so if an attacker steals your encryption key, they cannot go back and decrypt messages they may have collected in the past.

Using Signal and Red Phone means your voice conversations are always full scrambled. 

Other apps with encryption tend to enter insecure modes at unpredictable times, unpredictable for many users, at least. Apple’s iMessages, for example, employs strong encryption, but only when communicating between two Apple devices and only when there is a proper data connection. Otherwise, iMessages falls back on insecure SMS messaging. iMessages also lacks forward secrecy and inspectable source code.

Signal also offers the ability for power users to verify the identity of the people they’re talking to, confirming that the encryption isn’t under attack. With iMessage, you just have to take Apple’s word for it. 

Intercept: http://bit.ly/1cw1AV9
Guardian: http://bit.ly/1cHu52d

« How Mobility Is Revolutionising Manufacturing
Cyber Vulnerability - Get Your Report for 2015 »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

National Response Centre for Cyber Crime (NR3C) - Pakistan

National Response Centre for Cyber Crime (NR3C) - Pakistan

National Response Centre for Cyber Crime (NR3C) is a law enforcement agency in Pakistan dedicated to fighting cyber crime.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

National Cyber Security Centre (NCSC) - New Zealand

National Cyber Security Centre (NCSC) - New Zealand

The role of the NCSC is to help New Zealand’s most significant public and private sector organisations to protect their information systems from advanced cyber-borne threats.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

Nerds On Site

Nerds On Site

Nerds On Site provide on-site & in-home IT and technical support, managed IT services, and cyber security through our collaborative team of highly-trained IT and Security professionals.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.

Increase Your Skills (IYS)

Increase Your Skills (IYS)

Armed and ready: raise awareness of cyberattacks in your company with the Full-Service Awareness Platform from IYS – fast and effective. We help you develop a robust, sustainable security strategy.

Norwegian Data Protection Authority (Datatilsynet)

Norwegian Data Protection Authority (Datatilsynet)

The Norwegian Data Protection Authority (Datatilsynet) is the national data protection authority for Norway.