Update: Obama's NSA proposals underscore reform challenges
Advocates and opponents of reform have plenty to complain about with the proposed changes, observers say
Computerworld - President Obama's proposals Friday to reform the National Security Agency's surveillance practices reflect the enormous challenges the administration faces in finding the right balance between national security needs and privacy and civil rights concerns.
Advocates of major NSA reform have already dismissed the proposals as too meager to effect meaningful reform. Others, meanwhile, are sure to worry about the changes affecting the ability of the NSA to do its mission.
"There is no pathway that will satisfy both the national security advocates and the privacy advocates," said Alan Paller, director of research at the SANS Institute. "So instead of trying to find one, [Obama] is trying to do the right thing."
Neither side is likely to be happy because the impact of the reforms will be controlled by the details, Paller said. U.S. security agencies, for instance, are sure to hate Obama's proposal to permit third parties to control phone metadata records. Privacy advocates won't like the expedited judicial review processes that will need to be put in place to allow NSA rapid access to the metadata, he said.
"And Congress is speaking with so many voices that it is unlikely a coherent plan will arise from that quarter," Paller said.
Obama called for a series of changes to the NSA's surveillance practices in response to concerns raised by NSA contractor Edward Snowden's leaks about the agency.
The most significant of these changes pertains to the NSA's controversial metadata program under which the agency for the past several years has been collecting telephone numbers and other details on all phone calls made by U.S residents.
The NSA claimed the data is vital to help it identify U.S. residents who may be communicating with terror suspects based outside the country. Privacy and civil rights advocates have slammed the program as illegal and unconstitutional.
In his remarks Friday, Obama reiterated the importance of the metadata collection effort but said he was ending the program as it stands. Instead of the NSA's holding on to the data records, the government will implement a new approach under which telecommunication companies or another third party will retain the bulk phone records and make them available to the NSA under court order.
The transition won't be simple and poses its own set of privacy and legal challenges, the president cautioned. "Any third party maintaining a single, consolidated database would be carrying out what is essentially a government function with more expense, more legal ambiguity, and a doubtful impact on public confidence that their privacy is being protected," he said,
Effective immediately, the NSA will be allowed to query the database only after getting proper judicial approval. Even then, the agency will only be allowed to search for phone records that are two steps removed from a number associated with a terrorist, instead of the current three-step standard, the president said.
Obama said he has also issued a new presidential directive that would strengthen executive branch oversight of the country's intelligence activities and provide greater transparency over surveillance activities. Going forward, the director of National Intelligence will work with the U.S. Attorney General's office to annually review and declassify any future opinions of the Foreign Intelligence Surveillance Court that have broad privacy implications, he said.
Obama noted that he has also called on Congress to authorize the creation of a panel of privacy and civil rights advocates to provide an independent voice to significant cases before the FISA Court.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Gartner 2013 Magic Quadrant for Enterprise Backup/Recovery Software See why CommVault was positioned as the #1 leader in Gartner's 2013 Magic Quadrant for Enterprise Backup/Recovery software for the 3rd year in...
- Forrester Report: CommVault is a Leader in Enterprise Backup and Recovery In this report, Forrester takes a deep dive into the evaluation criteria, how CommVault is positioned and the features and functionality that make...
- Forrester Wave for Enterprise Backup and Recovery Read this report to see how CommVault continues to outpace its competitors and why Forrester positioned CommVault Simpana as the top backup and...
- Architecting the Network of the Future Networks need to change, as does the way IT thinks about and manages them. In addition to reliability, IT must now add higher...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Cyberwarfare White Papers |