DOJ: U.S. government exceeded surveillance authority
The NSA says it is 'committed to upholding the law'
IDG News Service - The U.S. National Security Agency (NSA) exceeded its surveillance authority of U.S. residents under a far-reaching telephone and Internet communications wiretap program, the U.S. Department of Justice said Thursday.
During routine oversight of the NSA surveillance program, DOJ and NSA officials "detected issues that raised concerns," the DOJ said in a statement.
"Once these issues were identified, the Justice Department ... took comprehensive steps to correct the situation and bring the program into compliance," the statement added. "The Justice Department takes its national security oversight responsibilities seriously and works diligently to ensure that surveillance under established legal authorities complies with the nation's laws, regulations and policies, including those designed to protect privacy interests and civil liberties."
The DOJ statement came after a New York Times report Wednesday saying the NSA in recent months has exceeded congressional limits on the surveillance program. The Times report, quoting unnamed government officials, said the spying was "significant and systemic" in its over-collection of U.S. residents' phone calls and e-mail messages.
The NSA appeared to deny that it overstepped its authority. The agency is "committed to upholding the law," said spokeswoman Judith Emmel. "Our intelligence operations, including procedures for collection and analysis, are in strict accordance with U.S. laws and regulations."
NSA intelligence programs are subject to oversight from the DOJ, Congress and the Office of the U.S. Director of National Intelligence, she added. "Our employees work tirelessly for the good of the nation, and serve this country proudly," she said.
The new information about the NSA surveillance program sparked criticism from the American Civil Liberties Union (ACLU) and the tech trade group, the Computer and Communications Industry Association (CCIA).
Earlier this month, the DOJ filed a request for the dismissal of a lawsuit against the NSA for the surveillance program. CCIA President and CEO Ed Black said he was disappointed that the DOJ under President Barack Obama continues to defend the program.
"The new administration is not just defending those policies, but taking them a step further," Black said in a statement. "In its April court brief, the Obama DOJ argued that the government is completely immune from litigation for illegal spying and even that it can never be sued for violating federal privacy laws with surveillance techniques."
The CCIA called on Obama's administration to reverse course.
"President Obama appreciates more than most people how the Internet can be used as a tool to allow greater participation in a democracy," Black said. "That same tool could also be the greatest innovation for surveillance and repression in the wrong regime. Defending practices like this sets a dangerous precedent down the road and makes it easier for a government to expand the programs from surveilling terrorists to surveilling political opponents."
The ACLU requested that Congress launch an investigation of government surveillance programs. Congress passed the FISA Amendments ACT last July, which gave the government new spying powers, the ACLU noted.
"Congress was repeatedly warned that this type of abuse would be the obvious outcome of passing the FISA Amendments Act," Caroline Fredrickson, director of the ACLU Washington Legislative Office, said in a statement. "Congressional leadership promised after this law's passage that it would be re-examined. It's time to fulfill that promise and restore the checks and balances of our surveillance system. Warrantless surveillance has no place in an America we can be proud of."
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Accelerating Speed to Market in the Highly Competitive Automotive Industry
- This White Paper discusses how an Enterprise Project Portfolio Management solution optimizes project analysis, management, reporting and risk mitigation processes to accelerate new... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- HR and Finance Were made for Each Other View now >>
- The Value of Human Capital for Finance Professionals View now >>
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.