Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
February 3, 2015
4 Min Read
<p align="center">Image: <a href="https://www.flickr.com/photos/ideonexus/5175342301/in/photolist-8TjYXF-k9BBWz-k9BmJR-k9E7BA-a7mJYp-4difx4-k2cR95-5YUB2z-bGkhPn-niAeA4-mxrMxk-ePjKVA-64tcgY-nYkbSd-7LqRrU-a7pALC-k39ssK-puxR7r-7fpbFY-a7mJTH-isbpno-jM9sQZ-qcSB7W-64kQmM-q8PATt-p1XW9k-qqcJgs-q8GJ3G-qq6iUc-ptM6Bp-9ph6q2-bFk7cF-a7mJWD-6haZAf-9p4iWM-aE7h3B-bFk79z-64qJMN-9ptDm4-k9BqnH-k3bXXb-dbBksV-jMa8Gz-jMac7F-jMbz9A-aE7h3F-bz47RT-bz471k-eKJzVB-bmQaBn" target="_new">Ryan Somma</a></p>
5 Cloud Contract Traps To Avoid
5 Cloud Contract Traps To Avoid (Click image for larger view and slideshow.)
The White House on Tuesday issued new rules that limit how intelligence agencies can collect data and how long that data can be retained.
The rules, released through the Office of the Director of National Intelligence in response to a January 17, 2014, Presidential Directive to limit bulk data collection, include a requirement that intelligence agencies must delete information collected about non-US persons after five years unless relevant to national security. Data related to US persons was already subject to this requirement.
The rules now state that information about a person may not be disseminated in an intelligence report solely because that person is not a US person. Instead, intelligence agencies are "specifically required to consider the privacy interests of non-U.S. persons when drafting and disseminating intelligence reports."
The rules also add oversight, training, and compliance requirements to ensure that intelligence officers understand their responsibilities. In this, intelligence agencies face requirements similar to industry regulations that affect corporations and other organizations inside and outside the government.
The way bulk telephony data can be collected through Section 215 of the Patriot Act has been modified. Previously, demands for documents based on national security concerns could be approved by authorized NSA officials. Going forward, Foreign Intelligence Surveillance Court (FISC) approval is also required, except in "emergency circumstances."
In addition, intelligence agencies have had their chain of potential Patriot Act queries shortened from three to two. Previously, an agency such as the NSA could identify a suspect's metadata, follow that to a second set of contacts, and then follow those contacts to a third set of contacts. Henceforth, agencies can only follow two hops: Data associated with the target and data associated with the target's contacts.
[ Check out what Google has planned for its new wireless service. Read Google's Wireless Service Taps WiFi and Cellular. ]
Section 702 of the Foreign Intelligence Surveillance Act (FISA) faces new limitations, including amended minimization procedures when foreign intelligence is sought through surveillance of a US person. The Department of Justice and the Director of National Intelligence will henceforth review decisions to retain data for national security purposes that would otherwise be deleted if non-pertinent. In addition, the rules dictate that intelligence gathered through Section 702 will not be used against US persons in court, except "for national security purposes or in prosecuting the most serious crimes."
Also, gag orders imposed by National Security Letters -- through which the FBI can secretly demand data from companies about individuals -- will be lifted after three years or at the conclusion of an investigation, whichever is sooner, unless the FBI can show cause to maintain the order.
On Monday, a coalition of organizations including the Berkman Center for Internet and Society, the Calyx Institute, the Electronic Frontier Foundation, and New York University’s Technology Law and Policy Clinic launched a website called Canarywatch.org as a form of protest against the nondisclosure requirement that accompanies almost all National Security Letters. Companies, advocacy organizations, and individuals have objected to National Security Letters on various grounds. In 2013, a District Court judge in California found one of the five statutes used to issue National Security Letters unconstitutional.
Canarywatch.org aggregates "warrant canaries," published statements by companies such as Pinterest, Reddit, and SpiderOak that they have not received a National Security Letter. The companies posting these statements do so to speak through the absence of their words – they intend to delete their statements if they ever receive a National Security Letter, thereby conveying to their customers what the law will not allow them to say outright.
Though it may be illegal to disclose receipt of a National Security Letter, advocates of warrant canaries argue that that government cannot compel companies or individuals to make false statements – which a denial of receipt would become following the delivery of such a letter.
Attend Interop Las Vegas, the leading independent technology conference and expo series designed to inspire, inform, and connect the world's IT community. In 2015, look for all new programs, networking opportunities, and classes that will help you set your organization’s IT action plan. It happens April 27 to May 1. Register with Discount Code MPOIWK for $200 off Total Access & Conference Passes.
About the Author(s)
Editor at Large, Enterprise Mobility
Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.
You May Also Like
State of ITSM in Manufacturing
Evaluation Guide: How to Choose a Network Monitoring Tool
2023 IT Service Management Vendor Rankings & Quadrant
The Total Economic Impact™ Of Fortinet NGFW For Data Center And AI-Powered FortiGuard Security Services Solution Study
KVM SwitchÂ High Performance Applications with Dominion KX III