Intelligence officials call NSA reform bill 'flawed'
A recent bill to stop the NSA's bulk collection of telephone records would hurt its ability to catch terrorists, officials say
IDG News Service - Proposals in Congress to end the National Security Agency's bulk collection of U.S. telephone records would compromise the agency's ability to find and track terrorists, representatives of the intelligence community said Monday.
The USA Freedom Act, introduced last Tuesday by more than 85 U.S. lawmakers, would reduce NSA surveillance capabilities to the levels before the Sept. 11, 2011, terrorist attacks on the U.S., said Brad Wiegmann, deputy assistant attorney general of the National Security Division of the U.S. Department of Justice.
Wiegmann and other U.S. intelligence officials faced questions about alternatives to the controversial NSA phone records collection program during a hearing of the U.S. Privacy and Civil Liberties Oversight Board (PCLOB). The USA Freedom Act, sponsored by Senator Patrick Leahy, a Vermont Democrat, and Representative Jim Sensenbrenner, a Wisconsin Republican, would "essentially shut down" the phone records program, said Robert Litt, general counsel of the U.S. Office of the Director of National Intelligence.
The USA Freedom Act would require the NSA to show the records it seeks to collect are related to a foreign power, a suspected agent of a foreign power or a person in contact with a suspected agent. Among other changes, the bill would also require the NSA to get court orders to search U.S. residents' communications obtained without individualized warrants.
The bill is "flawed" because it presumes intelligence officials often have specific targets when looking for terrorist activity, said Patrick Kelley, acting general counsel of the Federal Bureau of Investigation. "That's the essence of terrorism prevention -- we don't know who we're after," he said."If we're limited to seeing numbers from a known [suspect], then we're not very effective."
The model of targeting specific suspects when trying to prevent terrorism doesn't work well, Kelley added. "We're connecting the dots here, so the fewer dots we that have, the fewer connections we'll make," he said. "You are reducing the amount of data available and therefore making it much more difficult to make the connections that we need to make."
PCLOB member Rachel Brand asked Litt if he would support a special advocate to argue for privacy issues at the U.S. Foreign Intelligence Surveillance Court, a proposal in the USA Freedom Act and advocated by several privacy advocates.
Litt said he has concerns about the special advocate assigned to the FISC. He questioned how such an advocate would have legal standing before the court. The addition of a special advocate at the FISC would also mean some terrorism suspects have more legal representation than U.S. residents have when law enforcement agencies are seeking court-ordered warrants, he said.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Leveraging Managed Security Services to Fight Growing Cybersecurity Threats
- IT Infrastructure-as-a-Service enables agile responses to constantly changing threats. All Government IT White Papers
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.