Feeds

Obama appoints intelligence boss to run 'independent' review of NSA

Presumably in the spirit of irony

5 things you didn’t know about cloud backup

President Obama has appointed James Clapper, the US Director of National Intelligence who was recently caught misleading Congress about the extent of NSA surveillance, as the head of the Review Group on Intelligence and Communications Technologies that will investigate the agency.

The president announced the review of US surveillance practices and legislation on Friday, including the appointment of a panel of "outside experts" who would investigate the scope of the NSA's spying capabilities and suggest new ideas. His decision to appoint Clapper to run the review board has left privacy advocates dismayed.

"In President Obama's announcement he called for both an 'independent' and 'outside' investigation. A task force that is appointed and overseen by the individual who is carrying out the domestic spying is the exact opposite," EFF policy analyst Mark Jaycox told The Register.

"Every week new details come to light about misconstrued statements from the leaders of the intelligence community and new details on even more spying. Congress must reassert its oversight role by setting up a special investigatory committee or independent investigation."

Clapper was caught out being "economical with the truth" in March, when he was asked by Senator Ron Wyden (D-OR) in congressional hearings if the NSA was collecting data on millions of Americans – a question Wyden had given to Clapper 24 hours in advance, as is usual for such official meetings.

Clapper said "no," (6:52 in the video, above) but weeks later, after Edward Snowden began leaking information about the activities of the intelligence services, he was forced to apologize (in a way) by saying that his response was technically correct. The issue was one of semantics in how you interpreted the meaning of the word "collect," he suggested.

Clapper has now been tasked by the president to set up a team of experts who will examine "whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust."

That mission statement differs somewhat from what Obama promised on Friday. At his White House press conference, the president said the team would be investigating any possible abuse of the system by government or contractors, but that appears to have dropped off the list of things to look at.

Clapper will review the evidence from the remaining unnamed team of independent experts and edit it into a report for the president within the next 60 days, with a full analysis due by the end of the year. ®

The essential guide to IT transformation

More from The Register

next story
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.