Feeds

American space self-monitoring plan delayed

Satellite must sit on arse

Beginner's guide to SSL certificates

America is delaying controversial plans to use satellites for spying on itself. It was announced yesterday that the Department of Homeland Security (DHS) would not open its planned National Applications Office until legislators' concerns were addressed.

The idea of the National Applications Office was that it would allow the use of powerful US surveillance and scientific satellites to support security operations within America itself. Spy satellites in particular normally work at the behest of agencies focused beyond the American borders.

Under DHS plans, however, space intel would be obtainable by law-enforcement, disaster relief and security officials who would not normally have such access. This would perhaps boost border security, policing, counter-terrorism and even emergency management efforts by federal officials.

But Democrats on the congressional oversight committee have viewed the plans with alarm, and have now won a halt to proceedings until the DHS clarifies exactly how the new satellite-surveillance office will work, for whom and what procedures it will follow.

DHS Chief Intelligence Officer Charles Allen has now reportedly written to the Homeland Security committee chairman, saying that the Department "has no intention to begin operations until we address your questions." Allen said he plans to provide Thompson with "a progress report" this week, followed by a detailed briefing.

"I look forward to working with you and your committee to ensure the National Applications Office enhances support to homeland security, protects US privacy and civil liberties, and is consistent with the Constitution and all applicable laws and regulations," the letter said.

The US already has procedures for using spy satellites against locations within its own borders. An existing body, the Civil Applications Committee, handles such matters at the moment. According to the DHS, the proposed new office would offer better and easier access balanced by more layers of oversight.

More from GovExec.com here

Intelligent flash storage arrays

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
Hungary's internet tax cannot be allowed to set a precedent, says EC
More protests planned against giga-tariff for Tuesday evening
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.