Feeds

US privacy group sues NSA for Echelon info

Yeah, now we got 'em on the run...

  • alert
  • submit to reddit

Seven Steps to Software Security

US National Security Agency officials may or may not be shaking in their boots in response to a recent onslaught of public interest in their alleged activities. In past months, the US Congress has cast a jaundiced eye on the Agency and may bring it somewhat to heel in the next session; and the American Civil Liberties Union has launched a Web site called Echelon Watch, which posts information and fairly responsible speculation on NSA's global eavesdropping network. Now the Electronic Privacy Information Center (EPIC) has filed suit in federal court demanding public disclosure of internal NSA documents addressing the legality of the Agency's intelligence activities. "The charter of the National Security Agency does not authorise domestic intelligence gathering. Yet we have reason to believe that the NSA is engaged in the indiscriminate acquisition and interception of domestic communications taking place over the Internet," EPIC director Marc Rotenberg said via a press release issued Friday to mark the happy occasion. One issue is the unknown technique by which the NSA sifts the global electronic cloud for information it needs, and is entitled to gather. The Agency has refused to disclose the details on grounds that doing so would compromise its effectiveness; but critics suspect that this argument merely conceals the fact that the technology is inadequate to safeguard the privacy of ordinary citizens. We would not be surprised to find that such is the case. Still, we wonder what EPIC hopes to gain with this suit, beyond a bit of negative PR directed against an Agency which has already proven itself cheerfully insensitive to such pressures. It is highly unlikely that a judge would order the public release of internal NSA documents, though one might wish to examine them in chambers. This provides an interesting publicity situation for the NSA, which, if it were cleared of wrongdoing by the court, would nevertheless remain the favourite straw-ghoul of conspiracy theorists, whose paranoid delusions extend eagerly to encompass the entire federal judicial system. Indeed, a positive court finding would only reinforce fears that the NSA's malevolent power reaches all the way to the top. It is entirely possible that the Agency welcomes such speculation, if, as we suspect, its reputation as a lot of Bad Muthas derives more from the fears of the unbalanced than from its own record of accomplishment. ®

Boost IT visibility and business value

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.