Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

NSA Foreign Data Sweep Legal, Valuable: Panel

WASHINGTON – The National Security Agency’s vast data collection program targeting foreign nationals is a largely legal, valuable tool in fighting terrorism, a watchdog panel said Tuesday.

WASHINGTON – The National Security Agency’s vast data collection program targeting foreign nationals is a largely legal, valuable tool in fighting terrorism, a watchdog panel said Tuesday.

The panel, which earlier this year issued a sharp rebuke of domestic surveillance efforts, said in a preliminary report that the foreign intelligence efforts are generally in line with the US constitution, while raising some concerns about unintentional data gathering of Americans.

“The program has proven valuable in the government’s efforts to combat terrorism as well as in other areas of foreign intelligence,” said the report from the Privacy and Civil Liberties Oversight Board, a panel created on the recommendation of the 9/11 Commission.

The report released as a draft, subject to a vote on Wednesday of the panel, appears to vindicate at least some aspects of the vast NSA data sweep, while sidestepping questions on whether privacy protections of US law should be extended to “non-US persons.”

The panel was largely supportive of the NSA’s handling of the programs authorized by Section 702 or the Foreign Intelligence Surveillance Act — the opposite of its conclusion in January of the huge telephone metadata collection effort by the intelligence agency.

“Presently, over a quarter of the NSA’s reports concerning international terrorism include information based in whole or in part on Section 702 collection, and this percentage has increased every year since the statute was enacted,” the report said.

NSA data sweep helpful

This effort “has enabled the government to learn how they operate, and to understand their priorities, strategies, and tactics. In addition, the program has led the government to identify previously unknown individuals who are involved in international terrorism, and it has played a key role in discovering and disrupting specific terrorist plots aimed at the United States and other countries,” it added.

Advertisement. Scroll to continue reading.

The panel noted however that some aspects of the Section 702 program are “close to the line of constitutional reasonableness,” notably the incidental collection of communications of Americans and a broad interpretation of Internet data that may be searched.

The panel began its review last year of the programs revealed in materials leaked by former NSA contractor Edward Snowden, which led to a firestorm of criticism both at home and abroad.

The panel examined the program dubbed PRISM which collects data from major Internet companies as well as a separate “upstream: collection via Internet backbone firms.

The review said that unlike the phone monitoring, this type of surveillance without a warrant has generally been accepted under a foreign intelligence exception. And it noted that the programs did have some court supervision, through the secret FISA court.

It said surveillance of foreign targets “raises important but difficult legal and policy questions” but did not make specific recommendations on this.

Instead, the panel said it would participate in a review ordered by President Barack Obama on whether foreign nationals should be accorded similar privacy protections.

“Privacy is a human right that has been recognized most prominently in the International Covenant on Civil and Political Rights,” it said.

But the board said “it can make its most productive contribution in assessing these issues” in the context of the presidential review process.

A separate White House-appointed panel in December called for major reforms of US eavesdropping programs, and Obama has pledged to make changes, US lawmakers are also debating efforts to curb the NSA’s capabilities.

The latest Snowden revelations, reported by The Washington Post this week, indicated the United States used broad authority to intercept information from most countries, but had “no-spying arrangements” with Britain, Canada, Australia and New Zealand.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.