Latest NSA revelations could help pending lawsuits

Declassified secret U.S. court documents showing the National Security Agency (NSA) violated the Constitution in collecting the Internet communications of Americans could help lawsuits challenging the government surveillance.

On Wednesday, the Obama administration released three opinions issued by the Foreign Intelligence Surveillance Court. One of the opinions, an October 2011 ruling written by federal judge John Bates, found that parts of the NSA surveillance program were unconstitutional and had to be changed.

In addition, Bates wrote that the NSA had misrepresented its surveillance efforts to the court at least three times from 2008 to 2011. During that time, the agency had been collecting domestic data amounting to 58,000 communications a year. The information included emails and other Internet activity.

The remaining opinions dealt with steps the NSA took to purge information it shouldn't have collected and to narrow data gathering from what it called "upstream" communications, which involved tapping into the Internet from sources outside service providers and telecommunication companies. The court later ruled the modifications made the surveillance program legal and said it could continue.

At least three major lawsuits have been filed against the NSA by civil rights advocates challenging the constitutionality of the agency's massive Internet surveillance program, which is meant to catch communications between terrorists in and outside the U.S. The NSA is barred from intercepting domestic communications.

Kurt Opsahl, senior staff attorney for the Electronic Frontier Foundation, a plaintiff in one of the suits, said the newly released FISC documents should help. EFF sued the NSA in 2008.

In such cases, the government often refuses to release information about classified programs, arguing that they are protected under laws allowing for the withholding of data on the grounds of national security.

[Also see: Groklaw shutdown shows 'chilling effect' of NSA surveillance | Why we can't stop malicious insiders | NSA revelations a mixed bag for private clouds | Cloud market destined to change following NSA leaks | U.S. openness, restraint could lessen fallout from NSA surveillance | NSA snooping bolsters opponents of U.S. Internet control]

In the EFF case, the federal courts had ruled against the government's arguments for withholding information, but an appeal was always possible, Opsahl said. "If they did appeal, however, they would be dealing with a new situation on the ground, which is that so much has been declassified," he said.

The latest documents also show that oversight of the NSA program has failed, Opsahl said. The FISC acknowledged that NSA misled it for three years. "These oversight mechanisms are not able to provide the proper oversight," he said.

Opsahl's opinion was echoed by the American Civil Liberties Union, which said the documents provided "further evidence that current oversight mechanisms are far too feeble."

"This kind of surveillance is unconstitutional, and Americans should make it very clear to their representatives that they will not tolerate it," Jameel Jaffer, the ACLU's deputy legal director, said in a statement. The ACLU is also suing the NSA.

The new disclosures are expected to add to Americans' growing concern that their civil liberties are being trampled. In July, a Washington Post-ABC News poll found 70 percent of Democrats and 77 percent of Republicans believed NSA surveillance programs intruded on their privacy rights.

Numerous reform bills have been introduced in Congress, and at least one expert believes the latest revelations will add to Americans' concerns, which over time could grow enough to pressure congressional action.

Peter Ludlow, a professor at Northwestern University who has written extensively about U.S. intelligence work, said,Ã'Â "As the revelations come out, you see people's thinking about this shifting, and people are coming to understand slowly but surely that something deeply wrong is happening with the NSA."

Read more about data privacy in CSOonline's Data Privacy section.

Join the CSO newsletter!

Error: Please check your email address.

Tags NSA leaksNational Security AgencyFISA courtapplicationsnsasoftwaredata protectionData Protection | Data PrivacyNSA PRISM Surveillance Program

More about ABC NetworksABC NetworksEFFElectronic Frontier FoundationNational Security AgencyNSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts