CIO - Amid growing concerns about loose oversight and insufficient transparency associated with the government's electronic surveillance operations, lawmakers on Thursday plan to introduce legislation that would rein in the authorities of the secret court operating under the Foreign Intelligence Surveillance Act (FISA).
At a Judiciary Committee hearing on Wednesday, Sens. Richard Blumenthal (D-Conn.) and Al Franken (D-Minn.) announced plans to back bills that would bring proceedings at the FISA court more in line with those at conventional judicial courts, and roll back some of the secrecy provisions to shed more light on judges' rulings and the extent to which phone and Internet companies are sharing information about their customers' communications.
Franken, citing the "lack of transparency around these programs," seemed to react with skepticism to the testimony of intelligence officials who insisted that they are eager to engage in the debate over the privacy implications of the National Security Agency's surveillance of phone records and digital communications.
"I don't want a situation where the government is transparent only when it's convenient for the government," Franken says. "When it's ad hoc transparency, that doesn't engender trust, I don't think."
Earlier on Wednesday morning, the director of national intelligence released a set of previously classified documents involving the NSA's bulk collection of telephone metadata, including the primary order, partially redacted, issued by the FISA court authorizing the program.
Deputy Attorney General James Cole defended the program before the committee, noting that the data that is being collected is abstracted to avoid personal identifiers like the contents of calls or the location of cell sites, and that within the intelligence community, access to the database is extremely limited.
"Nobody is listening to anyone's conversation through this program, and nobody could," Cole says.
At the same time, he allowed that the intelligence community is "constantly seeking to achieve the right balance between the protection of national security and the protection of privacy and civil liberties," but insisted that "the 11 judges on the FISA court are far from a rubber stamp."
The members of the judiciary panel generally acknowledged that government intelligence operations warrant an inherent level of secrecy, but several senators argued that the FISA proceedings need a stronger measure of transparency and accountability. Franken said that the legislation he plans to introduce would require disclosures about the number of Americans who have had their information collected and reviewed by intelligence authorities.
Additionally, he will press for provisions to relax the gag orders that bar companies from publicizing the extent of the information they share with the government under FISA orders. Some tech companies, most notably Google and Microsoft, have been seeking authorizations to make more detailed FISA disclosures associated with the NSA's PRISM program, in part to counter the notion that the government has been able to open a back door to obtain unlimited data from their corporate servers.
Blumenthal is planning to bring forward legislation that would revamp the proceedings at the FISA court, introducing a security-cleared attorney to push back against the government's requests for new data-collection authorizations. The idea, he explains, is to make the FISA court arguments more adversarial, bringing them in line with the norms of regular judicial proceedings.
"The basic idea is that judges are accustomed to hearing two sides of an argument," Blumenthal says.
The new legislation follows a bipartisan bill recently introduced by Judiciary Chairman Patrick Leahy (D-Vt.) that would provide for more oversight and narrow the authorities the NSA and FBI operate under in their data-collection and surveillance activities. Leahy, who will sign on as a cosponsor of Franken's bill, expressed concern at the lack of candor about the programs from some members of the intelligence community, including James Clapper, the director of national intelligence, who in testimony before the Judiciary Committee in March said that the NSA does not intentionally collect wholesale information on hundreds of millions of Americans. Three months later, former NSA contractor Edward Snowden's revelations about the NSA's phone-data and PRISM programs came to light.
"We need straightforward answers. I'm concerned we're not getting them," Leahy says.
Kenneth Corbin is a Washington, D.C.-based writer who covers government and regulatory issues for CIO.com. Follow Kenneth on Twitter @kecorb. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn.
Read more about government in CIO's Government Drilldown.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- BYOD Invasion: A Computerworld Report on the Consumerization of IT
- We profile three companies that aren't just coping, but learning valuable lessons. If, like them, you're thinking about mobile device management our definitive... All Government IT White Papers
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.