DOJ: Surveillance program now court-approved
FISA judge OKs previous warrant-dodging NSA program
IDG News Service - A controversial surveillance program to wiretap telephone and Internet communications in and out of the U.S. will now fall under the jurisdiction of a U.S. court, the Department of Justice said Wednesday.
A judge with the secret U.S. Foreign Intelligence Surveillance Act (FISA) court on Jan. 10 authorized the U.S. government to wiretap phone or Internet communications involving suspected members of al Qaeda or other terrorist organizations, the DOJ said. The FISA-approved surveillance would replace the Terrorist Surveillance Program at the National Security Agency (NSA), authorized by U.S. President George Bush in 2002 to create wiretaps without court-issued warrants.
The FISA ruling will allow the surveillance program to essentially continue as it has, only with court approval, a senior DOJ official said. Under the NSA program, U.S. agents were allowed to wiretap Internet and telephone communications into and out of the U.S. in which one participant was suspected to be linked to al Qaeda.
Civil liberties groups had protested the NSA program, saying its lack of court oversight violated the U.S. Constitution. The Electronic Frontier Foundation (EFF) has filed a lawsuit against AT&T Inc. for allegedly participating in the NSA program, and in August, a U.S. district judge in Michigan ruled the NSA program was illegal.
Bush is "committed to using all lawful tools to protect our nation from the terrorist threat," U.S. Attorney General Alberto Gonzales wrote in a Wednesday letter to members of the U.S. Congress. "Although ... the Terrorist Surveillance Program fully complies with the law, the orders the government has obtained will allow the necessary speed and agility while providing substantial advantages," Gonzales wrote.
Bush will not reauthorize the old NSA program when it expires sometime in the next 45 days, the senior DOJ official, who requested anonymity, said Wednesday. But the FISA-authorized program will have the same capability as the old program, the official said.
The FISA court will approve wiretap requests for 90 days at a time, the DOJ official said. The court will have authority to review individual wiretap requests, but the DOJ official declined to provide specific information about how the FISA program will work.
Bush administration officials denied that the FISA court acted to provide political and legal cover for the NSA program, but the DOJ official said the FISA ruling will allow Congress to step back and look at the wiretap program without legal questions hanging over it. The FISA ruling "should take some of the political heat off the debate," the DOJ official said.
The EFF didn't have an immediate comment on the FISA decision.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts