U.S. lawmakers move to curb NSA collection of phone and other records
Bipartisan bill aims to make bulk collection of telephone records illegal
IDG News Service - A bipartisan group of four U.S. lawmakers has introduced legislation that will prohibit bulk collection of phone records of Americans.
Called the Intelligence Oversight and Surveillance Reform Act, the bill introduced by Democratic Senators Ron Wyden, Mark Udall and Richard Blumenthal, and Republican Senator Rand Paul will also provide for the creation of a "constitutional advocate" to argue against the government in significant cases before the secret Foreign Intelligence Surveillance Court. It will also set up a process for making significant FISC decisions public.
Former National Security Agency contractor, Edward Snowden, disclosed through newspaper reports in June that the NSA was collecting phone metadata from Verizon customers in the U.S. as part of its surveillance, which was said to also include collection of data from Internet companies. The Internet companies denied reports that the NSA had real-time access to content on their servers for its surveillance.
Under the proposed amendments in the new bill to the Foreign Intelligence Surveillance Act, the government would still be able to obtain records of anyone suspected of terrorism or espionage, or anyone in contact with a suspected terrorist or spy. But the bulk collection of "records of law-abiding Americans with no connection to terrorism or espionage will no longer be legal," according to an explanatory brief of the proposed legislation.
An amendment to section 702 of FISA also aims to close a "back-door searches" loophole by prohibiting the government from searching through communications collected under the section to deliberately conduct warrantless searches for the emails and other communications of specific Americans. Section 702 of FISA is designed "to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States," according to the government.
The bill also aims to strengthen a prohibition against "reverse targeting," the alleged ruse employed by surveillance agencies of targeting a foreigner in order to acquire without warrant the communications of an American who is known to be communicating with the foreigner.
The bill is just one of a number that aim to curb NSA's powers in the wake of Snowden's revelations. The U.S. House of Representatives narrowly defeated in July an amendment to a defense spending bill that would limit spending on mass surveillance by the NSA.
The amendment, proposed by Rep. Justin Amash, a Republican from Michigan, would limit spending only to orders by the FISC that collect phone and other data only of a person who is the subject of an investigation. The administration of President Barack Obama had earlier said that it opposed the "effort in the House to hastily dismantle one of our Intelligence Community's counterterrorism tools." Obama has appointed a panel of experts to review NSA surveillance.
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Gov't Legislation/Regulation White Papers | Webcasts