Wiretapping law's renewal dismays rights groups
The FISA Amendments Act presents a unknown privacy risk for Americans, opponents say
Computerworld - A last-minute move by the U.S. Senate to renew a controversial wiretapping law, days before it was set to expire on Dec. 31, has dismayed privacy advocates, rights groups and lawmakers who have long opposed the measure.
The FISA Amendments Act of 2008 is an anti-terror measure that authorizes U.S. intelligence agencies to conduct surveillance, including electronic wiretapping, of foreign nationals inside the U.S and overseas who are believed to pose a security risk to the country. Proponents of the measure have described it as a vital tool in the fight against terrorism.
But many others believe that the manner in which the law has been written allows U.S spy agencies to intercept, without a warrant, phone calls and other electronic communications that may involve American citizens as well.
They have decried what they claim is an absolute lack of transparency into how the law is being applied. They have demand more information on how FISA is being interpreted by the non-public court that was created under the law to handle search warrant requests involving foreign suspects on U.S. soil.
The law, which basically amends the Foreign Intelligence Surveillance Act (FISA) of 1978, was scheduled to expire on Dec. 31. But it was renewed in the U.S. Senate by a vote of 72-23 on Dec. 28 and signed into law by President Barack Obama two days later. The U.S House of Representatives voted last September to reauthorize the bill for another five years.
Mark Rumold, a staff attorney at the Electronic Frontier Foundation (EFF), said the renewal of the bill, without any of the several amendments that had been proposed by lawmakers such as Senators Ron Wyden (D-Ore.), Jeff Merkley (D-Ore.) and Rand Paul (R-KY), was disappointing.
It basically gives the government wide leeway to intercept all sorts of communications -- including those involving American citizens -- without needing to establish a particularly strong connection to terrorism, he said.
"My main concern with the law is that we don't know how it is being used," he said.
In fact, even many of the lawmakers who voted to extend the FISA amendments know very little about how, when, where or why it is being used, he said. Apart from lawmakers in the Senate Intelligence Committee and the Senate Judiciary Committee, very few have been briefed on the law and therefore know little about it, Rumold said.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Privacy White Papers | Webcasts