Wiretapping law's renewal dismays rights groups
The FISA Amendments Act presents a unknown privacy risk for Americans, opponents say
Computerworld - A last-minute move by the U.S. Senate to renew a controversial wiretapping law, days before it was set to expire on Dec. 31, has dismayed privacy advocates, rights groups and lawmakers who have long opposed the measure.
The FISA Amendments Act of 2008 is an anti-terror measure that authorizes U.S. intelligence agencies to conduct surveillance, including electronic wiretapping, of foreign nationals inside the U.S and overseas who are believed to pose a security risk to the country. Proponents of the measure have described it as a vital tool in the fight against terrorism.
But many others believe that the manner in which the law has been written allows U.S spy agencies to intercept, without a warrant, phone calls and other electronic communications that may involve American citizens as well.
They have decried what they claim is an absolute lack of transparency into how the law is being applied. They have demand more information on how FISA is being interpreted by the non-public court that was created under the law to handle search warrant requests involving foreign suspects on U.S. soil.
The law, which basically amends the Foreign Intelligence Surveillance Act (FISA) of 1978, was scheduled to expire on Dec. 31. But it was renewed in the U.S. Senate by a vote of 72-23 on Dec. 28 and signed into law by President Barack Obama two days later. The U.S House of Representatives voted last September to reauthorize the bill for another five years.
Mark Rumold, a staff attorney at the Electronic Frontier Foundation (EFF), said the renewal of the bill, without any of the several amendments that had been proposed by lawmakers such as Senators Ron Wyden (D-Ore.), Jeff Merkley (D-Ore.) and Rand Paul (R-KY), was disappointing.
It basically gives the government wide leeway to intercept all sorts of communications -- including those involving American citizens -- without needing to establish a particularly strong connection to terrorism, he said.
"My main concern with the law is that we don't know how it is being used," he said.
In fact, even many of the lawmakers who voted to extend the FISA amendments know very little about how, when, where or why it is being used, he said. Apart from lawmakers in the Senate Intelligence Committee and the Senate Judiciary Committee, very few have been briefed on the law and therefore know little about it, Rumold said.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts