iTnews
  • Home
  • News
  • Technology
  • Security

US judge rules NSA metadata collection unconstitutional

By Marcos Colon on Dec 17, 2013 6:00AM
US judge rules NSA metadata collection unconstitutional

Says tactics 'almost Orwellian'.

A US District Court Judge in Washington ruled that the National Security Agency's (NSA) bulk collection of telephone records violates the privacy rights of Americans.

Judge Richard Leon of the District of Columbia, released a ruling in regards to lawsuits presented by public-interest lawyer Larry Klayman and Charles Strange, who are suing as customers of telecom companies, and argue that the agency's tactics violate their expectation of privacy.

According to the ruling, Judge Leon sides with the plaintiffs and has issued a preliminary injuction, which stops the NSA from further collecting anymore records belonging to the plaintiffs and would force the agency to destroy any it currently has relating to them.

The NSA's expansive surveillance program monitors phone call information, known as metadata, and requires phone providers, such as Verizon, to hand over call records belonging to its millions of subscribers, according to government documents leaked by whistleblower and former NSA contractor Edward Snowden.

While there has been much public uproar over the NSA's surveillance efforts, this marks the first successful legal dispute brought against the agency's tactics, even though the judge stayed his injunction, which allows the government time to appeal.

Based on the agency's metadata collection methods, and how Congress has “great latitude” in creating authoritative plots, Judge Leon believes that the NSA's actions “may not hang a cloak of secrecy over the Constitution. He believes the program, which he describes as “almost Orwellian,” violates the Constitution.

“I cannot imagine a more ‘indiscriminate' and ‘arbitrary' invasion than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval,” Judge Leon wrote. “Surely, such a program infringes on ‘that degree of privacy' that the founders enshrined in the Fourth Amendment.”

The ruling, say some commentators, vindicates Snowden, who revealed the details of the NSA's actions in collaboration with journalist Glenn Greenwald. From his exile in Russia, Snowden reached out today to Greenwald. His comments were reported in the New York Times:

“I acted on my belief that the N.S.A.'s mass surveillance programs would not withstand a constitutional challenge, and that the American public deserved a chance to see these issues determined by open courts,” Snowden wrote. “Today, a secret program authorized by a secret court was, when exposed to the light of day, found to violate Americans' rights. It is the first of many.”

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
nsasecuritysnowden

Partner Content

Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Marcos Colon
Dec 17 2013
6:00AM
0 Comments

Related Articles

  • Chinese researchers attribute 'top-tier' backdoor to NSA Equation Group
  • Don't remove PowerShell: US, UK and NZ security agencies
  • US agencies accuse China of attacking telcos and network providers
  • Microsoft Exchange Server bugs top 2021 most-exploited list
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.