recommended reading

Secret Court and Rand Paul Face Off Over Domestic Spying

J. Scott Applewhite/AP

A secret federal court has greenlighted the government's continued collection of call logs from millions of Americans, Director of National Intelligence James Clapper disclosed on Friday, as demands for the program’s abolishment reached new heights.

Later on Friday, Sen. Rand Paul, R-Ky., a potential 2016 presidential contender, said he will file a class action lawsuit against the government to stop the surveillance. 

DNI officials had attempted to preempt such blowback when they announced the court's blessing. They made promises to declassify the court order and consider a recommendation to shift data collection to private companies. 

"In light of the significant and continuing public interest in the telephony metadata collection program, DNI Clapper has decided to declassify and disclose publicly that the government filed an application with the Foreign Intelligence Surveillance Court seeking renewal of the authority to collect telephony metadata in bulk, and that the court renewed that authority on Jan. 3," DNI Public Affairs Director Shawn Turner said in a statement. 

Paul announced his lawsuit on Fox News later in the day and posted a signup sheet on his Senate campaign website for aggrieved citizens. Basically anyone in the United States with a cell phone would be eligible to participate in the litigation, he claims.

Under the National Security Agency program, records detailing citizen and foreign national calls, including phone numbers, time stamps and durations of conversations, are harvested to detect possible plots and conspirators. So much data is being gathered that NSA needs to open at least two more data centers in Maryland and Utah for storage and backup.

Last month, a White House-appointed review panel called for an end to the hoarding, citing the program’s potential to chill free speech and invade privacy. The panel members advised officials to outsource collection activities to phone companies or a private entity. 

As part of yet another fight against phone monitoring, the American Civil Liberties Union on Thursday appealed a Dec. 27 decision by U.S. District Judge William Pauley that upheld the program.  His opinion described the effort as a "counter-punch" to al-Qaeda's terror network that is continuously monitored by the secret court. The court reviews it every 90 days.

The Obama administration remains committed to the effort, based on recent comments. Turner on Friday said the Justice Department has contested a separate Dec. 16 ruling by U.S. District Judge Richard Leon that found the call log program unlawful, haphazard and intrusive. 

But Turner signaled the White House’s willingness to make some adjustments in line with the panel’s suggestions. "The intelligence community continues to be open to modifications to this program that would provide additional privacy and civil liberty protections while still maintaining its operational benefits," he said. "The administration is carefully evaluating the recommendation of the President's Review Group on Intelligence and Communications Technologies regarding transitioning the program to one in which the data is held by telecommunications companies or a third party."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.