US to release annual figures on spying orders and people affected
Legislators, rights groups and Internet companies have asked for transparency of government surveillance
IDG News Service - The U.S. government has decided to release data annually on its secret spy orders and the number of people affected by them, the country's intelligence chief said Thursday.
The government will release the total number of orders issued during the prior 12-month period, and the number of targets affected by the orders, Director of National Intelligence James R. Clapper said in a statement on "IC on the record," the DNI's page on Tumblr.
The disclosures will be broken down under certain categories such as data requests under the business records provision of the Foreign Intelligence Surveillance Act (FISA) and National Security Letters issued by the government, he added.
The move follows demands by lawmakers, rights groups and Internet companies that the government should release more information on the secret collection of data from telephone and Internet companies by the National Security Agency.
Former NSA contractor Edward Snowden revealed through newspapers certain documents that suggested that the government had real-time access to content on servers of some Internet companies, under a surveillance program called Prism. The companies have denied their participation in the NSA program. The Guardian newspaper in the U.K. also published in June a copy of an order to Verizon by the Foreign Intelligence Surveillance Court in Washington, D.C., which required Verizon to provide call records or "telephony metadata" of its customers to the NSA on an ongoing daily basis.
Most of these data requests have been in the form of "gag orders," which prohibit the recipients of data request orders from discussing them in public. Microsoft and Google have asked FISC to allow them to disclose aggregate numbers on FISA and related data requests by the government, but the U.S. Department of Justice has postponed replying to the pleas six times so far.
Internet companies like Facebook, Yahoo, Apple and Microsoft have so far released aggregate figures for data requests from the government, but didn't say how many were related to national security. The companies said they could not break out requests under FISA, because those figures were classified.(
"Our ability to discuss these activities is limited by our need to protect intelligence sources and methods," Clapper said in the statement.
He described FISA and national security letters as an "important part of our effort to keep the nation and its citizens safe." Disclosing more detailed information about how they are used and to whom they are directed can help enemies avoid detection, he added.
Following criticism of the NSA surveillance program, President Barack Obama said earlier this month that his administration will appoint an independent board to review the country's surveillance programs, and also add a privacy advocate to defend privacy in the FISA court when agencies ask the court for new surveillance orders. Obama also said he will work with the U.S. Congress to limit data collection by the NSA under the Patriot Act.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
Top Considerations for Moving to a Cloud Delivery Model for ITSM
Find out whether SaaS-based ITSM is right for you
- Software-as-a-service is more than just a cloud-based delivery model-it's a new approach to service that lets companies optimize utilization of in-house IT resources... All Government IT White Papers
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs George Weiss, Gartner Vice President and Analyst, and Praveen Akkiraju, CEO of VCE, provide practical information regarding the various aspects of Integrated Infrastructures...
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.