Intelligence officials call NSA reform bill 'flawed'
A recent bill to stop the NSA's bulk collection of telephone records would hurt its ability to catch terrorists, officials say
IDG News Service - Proposals in Congress to end the National Security Agency's bulk collection of U.S. telephone records would compromise the agency's ability to find and track terrorists, representatives of the intelligence community said Monday.
The USA Freedom Act, introduced last Tuesday by more than 85 U.S. lawmakers, would reduce NSA surveillance capabilities to the levels before the Sept. 11, 2011, terrorist attacks on the U.S., said Brad Wiegmann, deputy assistant attorney general of the National Security Division of the U.S. Department of Justice.
Wiegmann and other U.S. intelligence officials faced questions about alternatives to the controversial NSA phone records collection program during a hearing of the U.S. Privacy and Civil Liberties Oversight Board (PCLOB). The USA Freedom Act, sponsored by Senator Patrick Leahy, a Vermont Democrat, and Representative Jim Sensenbrenner, a Wisconsin Republican, would "essentially shut down" the phone records program, said Robert Litt, general counsel of the U.S. Office of the Director of National Intelligence.
The USA Freedom Act would require the NSA to show the records it seeks to collect are related to a foreign power, a suspected agent of a foreign power or a person in contact with a suspected agent. Among other changes, the bill would also require the NSA to get court orders to search U.S. residents' communications obtained without individualized warrants.
The bill is "flawed" because it presumes intelligence officials often have specific targets when looking for terrorist activity, said Patrick Kelley, acting general counsel of the Federal Bureau of Investigation. "That's the essence of terrorism prevention -- we don't know who we're after," he said."If we're limited to seeing numbers from a known [suspect], then we're not very effective."
The model of targeting specific suspects when trying to prevent terrorism doesn't work well, Kelley added. "We're connecting the dots here, so the fewer dots we that have, the fewer connections we'll make," he said. "You are reducing the amount of data available and therefore making it much more difficult to make the connections that we need to make."
PCLOB member Rachel Brand asked Litt if he would support a special advocate to argue for privacy issues at the U.S. Foreign Intelligence Surveillance Court, a proposal in the USA Freedom Act and advocated by several privacy advocates.
Litt said he has concerns about the special advocate assigned to the FISC. He questioned how such an advocate would have legal standing before the court. The addition of a special advocate at the FISC would also mean some terrorism suspects have more legal representation than U.S. residents have when law enforcement agencies are seeking court-ordered warrants, he said.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Armed and Dangerous: Help your IT Organization Embrace Enterprise Mobility
- Becoming a mobile enterprise means new opportunities for your organization yet letting employees choose their own devices and then access corporate resources, apps,... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more...
- Webinar: IBM IIM for Fraud, Abuse and Waste in Government View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You...
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.