Court's NSA ruling sets stage for contentious battle over surveillance
Lawmakers are already squaring off over the decision, which questions the spy agency's actions
Computerworld - U.S. District Court Judge Richard Leon's ruling in a case challenging the National Security Agency's bulk collection of phone records sets up what's likely to be a contentious legal battle to impose limits on government surveillance in the U.S.
Leon, a judge for the U.S. District Court for the District of Columbia, on Monday held that the NSA's warrantless collection of phone records on millions of Americans might be unconstitutional.
In a bluntly worded 68-page decision, Leon ruled that the plaintiffs in the case had a strong legal basis for challenging the constitutionality of the government's data collection efforts. Based on information presented to the court, the plaintiffs had demonstrated "a substantial likelihood of success on the merits of their Fourth Amendment claim," Leon noted.
The ruling is the first one to directly address the legality of the NSA's phone records collection since Edward Snowden first began leaking details of its activities to the media in June.
Lawmakers who back the NSA program and those who want to end it are already squaring off over what it means.
Sen. Patrick Leahy (D-VT), who has joined other lawmakers to sponsor a bill to end the NSA program, applauded the ruling. "Americans deserve an open and transparent debate about the constitutionality, efficacy, and appropriateness of the government's dragnet collection programs," he said in a statement Monday.
But Sen. Dianne Feinstein (D-Calif.), chairman of the Senate Intelligence Committee, has sponsored a bill that seeks to codify many of the NSA activities into law. She expressed reservations over Leon's opinion, and noted that it ran counter to the opinions of 15 separate federal judges who authorized the program while acting as judges for the Foreign Intelligence Surveillance Court (FISC).
FISC was set up to oversee the program.
Leon's opinion also differs from a ruling by a federal judge in California last month in a case involving four people charged with providing material support to Somali terrorists. In that case, Judge Jeffrey Miller of the Southern District of California held that the information collected under the calls records program by the NSA and provided to the FBI could be used as evidence against them.
"Clearly, we have competing decisions from those of at least three different courts (the FISA Court, the D.C. District Court and the Southern District of California)," Feinstein said in a statement. "Only the Supreme Court can resolve the question on the constitutionality of the NSA's program."
Rights advocacy groups were quick to hail the Monday decision as a significant victory for those seeking limits on the surveillance activities carried out by the government under the aegis of counter-terrorism.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Future Focus: What's Coming in Enterprise Mobility Management (EMM) Find out why Enterprise Mobility Management (EMM) solutions that are truly future-ready must be designed to enable Machine-to-Machine (M2M) capabilities and much more.
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Privacy White Papers | Webcasts