Court Briefly Returns NSA Surveillance Program

nsa05232015getty.jpg?itok=vFc9WZB-

A US federal court has made an order that the National Security Agency can resume the bulk collection of American’s phone records for roughly five months as the program is phased out.

Under the recent law aimed at ending the surveillance program, the USA Freedom Act, the government has a six-month transition period in which to continue collecting phone records.
In an order published by National Journal, a Foreign Intelligence Surveillance Court judge said that the program could continue for the remainder of that transition period.

“This application presents the question whether the recently-enacted USA FREEDOM Act, in amending Title V of FISA, ended the bulk collection of telephone metadata,” Judge Michael W. Mosman wrote.

“The short answer is yes. But in doing so, Congress deliberately carved out a 180-day period following the date of enactment in which such collection was specifically authorized.”

The ruling was in response to a government request to continue the program.

“The government respectfully submits that it may seek and this court may issue an order for the bulk production of tangible things,” the Justice Department said in a memo less than an hour after the USA Freedom Act was signed into law earlier this month.

The Justice Department and the office of the Director of National Intelligence confirmed the resumption of the metadata program in a statement but noted that it moves forward for the remaining transition period under new restrictions instituted in 2014 after a push by President Obama.

"During the transition period, absent a true emergency, telephony metadata can only be queried after a judicial finding that there is a reasonable, articulable suspicion that the selection term is associated with an approved international terrorist organization," the statement says. "In addition, the query results must be limited to metadata within two hops of the selection term instead of three."

The American Civil Liberties Union indicated it would push back against the ruling. “Neither the statute nor the Constitution permits the government to subject millions of innocent people to this kind of intrusive surveillance," said Deputy Legal Director Jameel Jaffer. "We intend to ask the Second Circuit to prohibit the surveillance and to order the NSA to purge the records it's already collected."

Former Virginia Attorney General Ken Cuccinelli, in consort with FreedomWorks, briefed the surveillance court on concerns raised by the government’s application to continue the program. Under the new law, the court will have a panel of experts to consult on controversial privacy cases — but that body hasn’t been created yet.

The passage of the USA Freedom Act marked the zenith of a debate over the program sparked by revelations about its existence and scope from leaker Edward Snowden.
The Hill: http://bit.ly/1JBl1qP

« Europol Tackles Cybercrime Ring
Merkel Bugged While Pondering Greece Crisis »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Mitre ATT&CK

Mitre ATT&CK

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

INTfinity Consulting

INTfinity Consulting

The INTfinity team brings together decades of professional experience in cybersecurity. We're here to apply that same experience and proficiency in defending your networks.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.