US Surveillance System Exposed By Snowden Goes Dormant

A controversial US surveillance programme whose forerunner was exposed by Edward Snowden has not been used for six months and is unlikely to be renewed, a key congressional aide has said.

Under the version of the programme, revealed in the Guardian by the National Security Agency whistleblower Snowden in 2013, the NSA collected the communication records of millions of US citizens indiscriminately and in bulk, regardless of whether or not they were suspected of wrongdoing.

Kicking off the second day of the IAPP Data Protection Intensive 2019 conference in London recently, former editor-in-chief of The Guardian Alan Rusbridger, reflected on the paper's coverage of the whistle-blowing events involving WikiLeaks and Edward Snowden.

In the case of Edward Snowden, Rusbridger said that some people who were players in this world “have quietly acknowledged to me that there were issues which had to be raised” and at the time that was not how some people saw it.
USA Freedom Act

In 2015, a federal appeals court ruled the existing programme illegal and it was replaced under the USA Freedom Act.
The act ended the collection of telephony “metadata” by the NSA and restricted it to data relevant to an investigation.
With the act due to expire at the end of this year, security and privacy campaigners have been braced for fresh arguments over the scope of the programme and whether it should be extended or revised.

But Luke Murry, the national security adviser to Republican House of Representatives minority leader, Kevin McCarthy, cast doubt on whether there would be any attempt to renew it.

“The administration actually hasn’t been using it for the past six months because of problems with the way in which that information was collected and possibly collected on US citizens, [and] in the way that was transferred from private companies to the administration … I’m actually not certain that the administration will want to start that back up,” he told the national security website Lawfare.

Daniel Schuman, the policy director of the civil liberties campaign group Demand Progress, told the New York Times: “If there is an ongoing program, even if we all have doubts about it, that’s a very different political matter than if the program has actually stopped.

“Then the question becomes ‘Why restart it?’ rather than whether to turn it off.”

Last year, the NSA announced it was deleting all call detail records acquired since 2015 because there had been “technical irregularities” in some data received from telecommunication service providers, which had also resulted in the agency receiving data it was not entitled to.

Under the programme, the numbers of both parties on a call can be handed over, along with location data, call time and duration, and unique identifiers. The contents of the conversation are not covered.

The existence of the original programme provoked an outcry about the extent of domestic spying and invasion of privacy.
It was part of a wider bulk collection programme of domestic telephone, internet and email records, secretly authorised by the then president, George W Bush, in the aftermath of September 11.

Guardian:      Infosecurity:

You Might Also Read:

Security & Encryption After Edward Snowden:​

 
« Half Of UK Businesses Have Fallen For Phishing Attacks
Cyber Criminals Are Changing Their Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Center for Information Security Awareness (CFISA)

Center for Information Security Awareness (CFISA)

CFISA was formed by a group of academics, security and fraud experts to explore ways to increase security awareness among audiences, including consumers, employees, businesses and law enforcement.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.