Risk
6/11/2013
01:21 PM
50%
50%

NSA Prism: Patriot Act Author Questions Scope

White House says NSA's surveillance programs implement FISA and the Patriot Act -- but Patriot Act author is not so sure. Meanwhile, privacy groups turn up the heat.

FISC is meant to be a safeguard. Yet the court appears to rubberstamp all such requests; only .03% have been rejected. That's based on annual Justice Department reports to Congress, which said that from 1979 through 2012, out of over 33,900 surveillance requests lodged by the Department of Justice, the court rejected only 11.

"The FISA system is broken," Marc Rotenberg, executive director of Electronic Privacy Information Center -- a privacy rights group -- told the Journal. "At the point that a FISA judge can compel the disclosure of millions of phone records of U.S. citizens engaged in only domestic communications, unrelated to the collection of foreign intelligence ... there is no longer meaningful judicial review."

But Timothy Edgar, a former top American Civil Liberties Union lawyer who joined the Director of National Intelligence in 2006 as a senior civil liberties official, said the process is "definitely not a rubber stamp." He told the Journal that the low level of rejections was down to the extent to which Justice lawyers vet all such requests before submitting them to the FISC.

Similarly, the American Civil Liberties Union (ACLU) and Yale Law School's Media Freedom and Information Clinic Monday filed a motion with FISC, requesting that the court publish its legal opinions "evaluating the meaning, scope, and constitutionality of Section 215."

Do the surveillance programs overreach and violate Americans' privacy? Public opinion appears to favor, slightly, the current course of action. According to a Pew Research Center and Washington Postsurvey conducted from June 6 to 9, in response to the statement that "NSA has been investigating people suspected of terrorist involvement by secretly listening in on phone calls and reading emails without court approval," 51% of respondents said they found it acceptable, while 47% didn't. Meanwhile, 62% said that having the government investigate terrorist threats was more important safeguarding people's privacy, while 34% disagreed.

Several information security experts have suggested that if the surveillance programs are too broad, however, it's not the fault of the intelligence community. "The highest priority at the NSA is avoiding infringing on citizen's rights. I know none of you will believe me, but it's true," said Robert David Graham, CEO of Errata Security, in a blog post. "I'm regularly astonished by the degree to which they bend over backwards to protect [Americans'] privacy."

So if you want to blame someone, says Graham, look to Congress. "The rank and file of the NSA is not your enemy. They carry out the mission that politicians give them, and do not cross the line with an almost religious fervor," he said. "It's the politicians who have moved that line. It's every politician who voted to extend the Patriot Act and empower the FISA court that you have to fight."

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
6/13/2013 | 11:36:51 AM
re: NSA Prism: Patriot Act Author Questions Scope
Now Sensenbrenner is disturbed? Programs like Prism are EXACTLY what the Patriot Acts were intended for. So Sensenbrenner is one of the authors (or more correctly, someone who let someone else write everything and he slapped his name on it) and he has no clue which broad antidemocratic, unconstitutional powers the Patriot Acts include? Maybe before anything else is done we need to make sure that naive and delusional politicians are removed from Congress.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.