Supreme Court refusal to block NSA data collection not surprising

With two cases pending in lower courts, justices probably wanted to defer decisions to them

Privacy rights advocates and legal experts this week said they were disappointed but not surprised with the U.S. Supreme Court's denial of a petition challenging the legality of the National Security Agency's phone metadata collection program.

The motion filed earlier this year by the Electronic Privacy Information Center (EPIC) had asked the high court to overturn an order by the Foreign Intelligence Surveillance Court (FISC) that required telecommunications giant Verizon to hand over all customer call records to the NSA.

In its brief, EPIC argued that the FISC had exceeded its legal authority in passing the order. "It is simply not possible that every phone record in the possession of Verizon is relevant to a national security investigation," EPIC stated in its argument.

The Supreme Court on Monday however declined to hear the case without explanation or comment.

"Obviously, we are disappointed by the Supreme Court's decision," said, Marc Rotenberg, president of EPIC. "The surveillance order was clearly unlawful. There is simply no way to establish relevance for the collection of all telephone records on all U.S. telephone customers for an intelligence investigation," he said in a statement.

EPIC is one of several groups that have challenged the legality of the NSA's blanket collection of phone records in the U.S. Two other cases similarly challenging the data collection are pending in federal district courts in New York and Washington D.C.

Former NSA contractor-turned-fugitive Edward Snowden leaked details of the program to several news media services earlier this year. The documents showed that the NSA has been systematically collecting call records from phone companies over the past several years.

The NSA has defended the practice by saying the data is essential to its ability to detect and deter those seeking to harm the U.S. The agency also claimed that it has the legal authority to collect the data under provisions of the U.S. Patriot Act.

Stephen Vladeck, a law professor at the American University Washington College of Law who filed a friend-of-the-court brief in support of the EPIC petition, said the ruling is not unexpected.

"It's not terribly surprising, especially given the ongoing challenges to the NSA's metadata collection currently proceeding in the D.C. and New York district courts," Vladeck said. "Indeed, I suspect that the justices would far rather wait to see what happens in the lower courts before deciding whether to weigh in as opposed to jumping the queue," he said.

Fred Cate, a law professor at the Indiana University Maurer School of Law, said that a writ of the sort filed by EPIC is always a long shot. "But I am disappointed because [the decision] effectively means that NSA surveillance is, at least for the moment, unreviewable by courts," he said.

Historically, courts have played a significant role in protecting civil rights and guarding against overreach by the government. "This week's decision undercuts that role since Congress gave exclusive authority to the Foreign Intelligence Surveillance Court and Review Court to hear cases involving domestic surveillance," he noted. "But only the government is empowered to appear before either court or bring cases before them."

This article, Supreme Court refusal to block NSA data collection not surprising, was originally published at

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed. His e-mail address is

See more by Jaikumar Vijayan on

Read more about legal in Computerworld's Legal Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags Gov't Legislation/RegulationNational Security AgencyregulationsecuritynsalegalgovernmentElectronic Privacy Information CenterintelprivacyU.S. Supreme Court

More about College of LawElectronic Privacy Information CenterFredNational Security AgencyNSATopicTwitterVerizon

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jaikumar Vijayan

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts