Obama in awkward spot after privacy board calls NSA snooping illegal
The bipartisan group also concludes metadata collection is mostly useless
Computerworld - A report Thursday by the Privacy and Civil Liberties Oversight Board (PCLOB) calling the National Security Agency's bulk phone records collection program illegal and mostly useless puts the Obama administration in an awkward spot.
Less than a week ago, President Obama had described the program as vital to the NSA's anti-terror effort.
In a speech announcing modest changes to the program, the president had acknowledged privacy and civil rights concerns that have been raised over the collection of phone metadata records on U.S. residents.
Because of those concerns, the government would implement a new approach under which telecommunication companies or a third party would retain the bulk records rather than the NSA, Obama said. At the same time, he insisted that the metadata collection is important.
"The telephone metadata program under Section 215 was designed to map the communications of terrorists, so we can see who they may be in contact with as quickly as possible," Obama said last week, calling the effort "critical" and saying it does not involve the NSA review of the phone records of ordinary Americans.
That characterization is at odds with the PCLOB's recommendations.
The board is an independent bipartisan group created in 2007 to ensure that federal anti-terror initiatives do not compromise civil and privacy rights. The group released a report Thursday on the government's authority to collect domestic phone metadata records under Section 215 of the USA Patriot Act.
The board's 238-page recommendation minces no words in describing the metadata program as minimally useful and not authorized under the Patriot Act, as the NSA has claimed.
The five-member board voted 3-2 to declare, that the Patriot Act does not provide a legal basis for the bulk collection of domestic phone records, MSNBC said, quoting from the report. In calling for an end to the collection program, the board also noted that it violates constitutional protections against unreasonable searches and fails to comply with the Electronic Communications Privacy Act of 1986.
The report also recommended that government store phone records data for no more than three years instead of five years, as it does now. In addition, the government should always obtain court approval before it can search through the stored data, the group concluded.
The two members in the minority on the board maintained that the government may indeed have authority to collect phone records data under Section 215.
The White House defended the legality of the program and said it disagrees with the PCLOB's conclusions.
"Consistent with the recent holdings of the United States District Courts for the Southern District of New York and Southern District of California, as well as the findings of 15 judges of the Foreign Intelligence Surveillance Court on 36 separate occasions over the past seven years, the Administration believes that the program is lawful," a spokeswoman for the White House National Security Council said in an emailed statement.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to... All Privacy White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!