Menu
US intelligence officials: NSA reform bill is 'flawed'

US intelligence officials: NSA reform bill is 'flawed'

A recent bill to stop the NSA's bulk collection of telephone records would hurt its ability to catch terrorists, officials say

Proposals in Congress to end the National Security Agency's bulk collection of U.S. telephone records would compromise the agency's ability to find and track terrorists, representatives of the intelligence community said Monday.

The USA Freedom Act, introduced last Tuesday by more than 85 U.S. lawmakers, would reduce NSA surveillance capabilities to the levels before the Sept. 11, 2011, terrorist attacks on the U.S., said Brad Wiegmann, deputy assistant attorney general of the National Security Division of the U.S. Department of Justice.

Wiegmann and other U.S. intelligence officials faced questions about alternatives to the controversial NSA phone records collection program during a hearing of the U.S. Privacy and Civil Liberties Oversight Board (PCLOB). The USA Freedom Act, sponsored by Senator Patrick Leahy, a Vermont Democrat, and Representative Jim Sensenbrenner, a Wisconsin Republican, would "essentially shut down" the phone records program, said Robert Litt, general counsel of the U.S. Office of the Director of National Intelligence.

The USA Freedom Act would require the NSA to show the records it seeks to collect are related to a foreign power, a suspected agent of a foreign power or a person in contact with a suspected agent. Among other changes, the bill would also require the NSA to get court orders to search U.S. residents' communications obtained without individualized warrants.

The bill is "flawed" because it presumes intelligence officials often have specific targets when looking for terrorist activity, said Patrick Kelley, acting general counsel of the Federal Bureau of Investigation. "That's the essence of terrorism prevention -- we don't know who we're after," he said."If we're limited to seeing numbers from a known [suspect], then we're not very effective."

The model of targeting specific suspects when trying to prevent terrorism doesn't work well, Kelley added. "We're connecting the dots here, so the fewer dots we that have, the fewer connections we'll make," he said. "You are reducing the amount of data available and therefore making it much more difficult to make the connections that we need to make."

PCLOB member Rachel Brand asked Litt if he would support a special advocate to argue for privacy issues at the U.S. Foreign Intelligence Surveillance Court, a proposal in the USA Freedom Act and advocated by several privacy advocates.

Litt said he has concerns about the special advocate assigned to the FISC. He questioned how such an advocate would have legal standing before the court. The addition of a special advocate at the FISC would also mean some terrorism suspects have more legal representation than U.S. residents have when law enforcement agencies are seeking court-ordered warrants, he said.

"Are you going to set up a process that provides more protection for a terrorist than for Americans who are subject of criminal search warrants?" he said.

PCLOB members questioned the limits of the NSA's authority to collect telephone and other records. "One question is, what's next? What could be next?" said board member James Dempsey. "What if the government decided it wanted to go back and start using [the Patriot Act to collect] Internet metadata?"

Dempsey asked if the NSA could use the same rationale it has used to collect telephone records to collect U.S. residents' Internet records.

Section 215 of the Patriot Act allows the NSA to collect tangible business records, Litt said. "It's not clear to me that the same legal authority could be used with respect to Internet service providers," he said.

The NSA had to provide evidence to the FISC that the bulk collection of telephone records was relevant to its antiterrorism efforts, Litt added. "We'd have to make that same showing to the court for another category of data," he said.

The FISC also put significant limitations on the NSA's use of the telephone data, he added. Any other bulk records collection program would face the same scrutiny, he said.

Intelligence officials told the board that NSA employees can only query the bulk telephone records for cases of counterterrorism, and those queries can only be more widely disseminated in a terrorism case.

Board member Patricia Wald asked if the NSA's search capabilities were mainly limited "to the technological capability of your search instruments," and not legal controls. "Can that be further expanded if new technological tools would allow you greater search capacity in this or other bulk programs?" she said. "Could the haystack be made as big as the technology tools you have [allow]?"

The FISC has considered the NSA's technological capabilities, but the court has not given the agency automatic authority to move forward as technology advances, said the DOJ's Wiegmann. "You have to look at all of the other factors the court considered," he said. "How important is the information? How necessary is it to get the information?"

Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's email address is grant_gross@idg.com.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags U.S. Federal Bureau of InvestigationtelecommunicationJim SensenbrennerRobert LittU.S. National Security AgencyU.S. CongressU.S. Office of the Director of National IntelligenceinternetprivacyJames DempseyPatrick KelleysecurityRachel BrandgovernmentPatrick LeahyPatricia WaldBrad WiegmannU.S. Department of Justice

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments