CIO - Amid growing concerns about loose oversight and insufficient transparency associated with the government's electronic surveillance operations, lawmakers on Thursday plan to introduce legislation that would rein in the authorities of the secret court operating under the Foreign Intelligence Surveillance Act (FISA).
At a Judiciary Committee hearing on Wednesday, Sens. Richard Blumenthal (D-Conn.) and Al Franken (D-Minn.) announced plans to back bills that would bring proceedings at the FISA court more in line with those at conventional judicial courts, and roll back some of the secrecy provisions to shed more light on judges' rulings and the extent to which phone and Internet companies are sharing information about their customers' communications.
Franken, citing the "lack of transparency around these programs," seemed to react with skepticism to the testimony of intelligence officials who insisted that they are eager to engage in the debate over the privacy implications of the National Security Agency's surveillance of phone records and digital communications.
"I don't want a situation where the government is transparent only when it's convenient for the government," Franken says. "When it's ad hoc transparency, that doesn't engender trust, I don't think."
Earlier on Wednesday morning, the director of national intelligence released a set of previously classified documents involving the NSA's bulk collection of telephone metadata, including the primary order, partially redacted, issued by the FISA court authorizing the program.
Deputy Attorney General James Cole defended the program before the committee, noting that the data that is being collected is abstracted to avoid personal identifiers like the contents of calls or the location of cell sites, and that within the intelligence community, access to the database is extremely limited.
"Nobody is listening to anyone's conversation through this program, and nobody could," Cole says.
At the same time, he allowed that the intelligence community is "constantly seeking to achieve the right balance between the protection of national security and the protection of privacy and civil liberties," but insisted that "the 11 judges on the FISA court are far from a rubber stamp."
The members of the judiciary panel generally acknowledged that government intelligence operations warrant an inherent level of secrecy, but several senators argued that the FISA proceedings need a stronger measure of transparency and accountability. Franken said that the legislation he plans to introduce would require disclosures about the number of Americans who have had their information collected and reviewed by intelligence authorities.
Additionally, he will press for provisions to relax the gag orders that bar companies from publicizing the extent of the information they share with the government under FISA orders. Some tech companies, most notably Google and Microsoft, have been seeking authorizations to make more detailed FISA disclosures associated with the NSA's PRISM program, in part to counter the notion that the government has been able to open a back door to obtain unlimited data from their corporate servers.
Blumenthal is planning to bring forward legislation that would revamp the proceedings at the FISA court, introducing a security-cleared attorney to push back against the government's requests for new data-collection authorizations. The idea, he explains, is to make the FISA court arguments more adversarial, bringing them in line with the norms of regular judicial proceedings.
"The basic idea is that judges are accustomed to hearing two sides of an argument," Blumenthal says.
The new legislation follows a bipartisan bill recently introduced by Judiciary Chairman Patrick Leahy (D-Vt.) that would provide for more oversight and narrow the authorities the NSA and FBI operate under in their data-collection and surveillance activities. Leahy, who will sign on as a cosponsor of Franken's bill, expressed concern at the lack of candor about the programs from some members of the intelligence community, including James Clapper, the director of national intelligence, who in testimony before the Judiciary Committee in March said that the NSA does not intentionally collect wholesale information on hundreds of millions of Americans. Three months later, former NSA contractor Edward Snowden's revelations about the NSA's phone-data and PRISM programs came to light.
"We need straightforward answers. I'm concerned we're not getting them," Leahy says.
Kenneth Corbin is a Washington, D.C.-based writer who covers government and regulatory issues for CIO.com. Follow Kenneth on Twitter @kecorb. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn.
Read more about government in CIO's Government Drilldown.
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Path Selection Infographic
- Path Selection Infographic
- Hyperconvergence Infographic
- A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era
- From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs
- If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity... All Government IT White Papers
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- How to Protect Enterprise Data Yet Enable Secure Access for End Users Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT...
- All Government IT Webcasts