US Surveillance System Exposed By Snowden Goes Dormant

A controversial US surveillance programme whose forerunner was exposed by Edward Snowden has not been used for six months and is unlikely to be renewed, a key congressional aide has said.

Under the version of the programme, revealed in the Guardian by the National Security Agency whistleblower Snowden in 2013, the NSA collected the communication records of millions of US citizens indiscriminately and in bulk, regardless of whether or not they were suspected of wrongdoing.

Kicking off the second day of the IAPP Data Protection Intensive 2019 conference in London recently, former editor-in-chief of The Guardian Alan Rusbridger, reflected on the paper's coverage of the whistle-blowing events involving WikiLeaks and Edward Snowden.

In the case of Edward Snowden, Rusbridger said that some people who were players in this world “have quietly acknowledged to me that there were issues which had to be raised” and at the time that was not how some people saw it.
USA Freedom Act

In 2015, a federal appeals court ruled the existing programme illegal and it was replaced under the USA Freedom Act.
The act ended the collection of telephony “metadata” by the NSA and restricted it to data relevant to an investigation.
With the act due to expire at the end of this year, security and privacy campaigners have been braced for fresh arguments over the scope of the programme and whether it should be extended or revised.

But Luke Murry, the national security adviser to Republican House of Representatives minority leader, Kevin McCarthy, cast doubt on whether there would be any attempt to renew it.

“The administration actually hasn’t been using it for the past six months because of problems with the way in which that information was collected and possibly collected on US citizens, [and] in the way that was transferred from private companies to the administration … I’m actually not certain that the administration will want to start that back up,” he told the national security website Lawfare.

Daniel Schuman, the policy director of the civil liberties campaign group Demand Progress, told the New York Times: “If there is an ongoing program, even if we all have doubts about it, that’s a very different political matter than if the program has actually stopped.

“Then the question becomes ‘Why restart it?’ rather than whether to turn it off.”

Last year, the NSA announced it was deleting all call detail records acquired since 2015 because there had been “technical irregularities” in some data received from telecommunication service providers, which had also resulted in the agency receiving data it was not entitled to.

Under the programme, the numbers of both parties on a call can be handed over, along with location data, call time and duration, and unique identifiers. The contents of the conversation are not covered.

The existence of the original programme provoked an outcry about the extent of domestic spying and invasion of privacy.
It was part of a wider bulk collection programme of domestic telephone, internet and email records, secretly authorised by the then president, George W Bush, in the aftermath of September 11.

Guardian:      Infosecurity:

You Might Also Read:

Security & Encryption After Edward Snowden:​

 
« Half Of UK Businesses Have Fallen For Phishing Attacks
Cyber Criminals Are Changing Their Methods »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

BankVault

BankVault

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Cloudentity

Cloudentity

Cloudentity combines Identity for all things with API and Application security in a unique deployment model, combining cloud-transformation and legacy systems.

Department of Justice & Equality - Cybercrime Division - Ireland

Department of Justice & Equality - Cybercrime Division - Ireland

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.