Feeds

Federal judge axes Bush mass surveillance

Ruled 'unconstitutional'

Internet Security Threat Report 2014

A Detroit federal judge has declared the Bush administration's warrantless wiretap scheme unconstitutional.

Ruling on a case brought by the American Civil Liberties Union (ACLU) against the government, US District Judge Anna Taylor said that the electronic dragnet violates the First Amendment, the Fourth Amendment, and the separation of powers mandated by the Constitution.

"It was never the intent of the Framers to give the president such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights," she wrote.

She added that the administration's actions also clearly violate the Foreign Intelligence Surveillance Act (FISA).

The spy scheme, euphemized by the Administration as the "Terrorist Surveillance Program," uses the National Security Agency (NSA) to eavesdrop on the phone call and email content of US citizens communicating overseas, without a warrant.

The US Department of Justice (DoJ) has appealed the ruling, and issued a press release complaining that the program is an "essential tool for the intelligence community in the war on terror."

"In the ongoing conflict with al Qaeda and its allies, the president has the primary duty under the Constitution to protect the American people," the Department claimed. "The Constitution gives the president the full authority necessary to carry out that solemn duty, and we believe the program is lawful and protects civil liberties."

The government complained that it can't prove its claims without revealing state secrets, and letting the terrorists win. The judge rejected that outright, claiming that the government's "arguments that they cannot defend this case without the use of classified information [is] disingenuous and without merit."

The ruling will not be implemented immediately, to give DoJ a chance to appeal. ®

Internet Security Threat Report 2014

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Ofcom tackles complaint over Premier League footie TV rights
Virgin Media: UK fans pay the most for the fewest matches
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.