CIO Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
Daily Briefing for Technology's Top Decision-Makers
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Thursday, April 24th 
Next Generation Data Center Is Here!
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Enterprise Software
Enterprise Hardware
Big Data
Network Security
Cloud Computing
CRM Systems
Data Storage
Operating Systems
Communications
CIO Issues
Mobile Tech
Chips & Processors
World Wide Web
Business Briefing
After Hours
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Data Security

Reforms Urged To Curb NSA Spying

Reforms Urged To Curb NSA Spying
December 19, 2013 1:37PM

Bookmark and Share
Although the recommendations to rein in NSA snooping are broad, they reflect the concerns of many in the wake of the Edward Snowden revelations about the NSA and related security agencies. This is a good first step but elected officials must keep the pressure on intelligence agencies, said analyst Charles King.

Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.

Yahoo, Google, Microsoft and the other Internet companies that have decried the National Security Agency’s (NSA) snooping tactics may see at least some of the changes they have been demanding. The President’s Review Group on Intelligence and Communications Technologies just issued a report with 46 recommendations that aim to balance national security, foreign policy, privacy and civil liberties.

Dubbed Liberty and Security in a Changing World, the recommendations in the report emphasize risk management and the need to consider a wide range of potential consequences, including both costs and benefits, in discussing potential reforms.

“The report emphasizes throughout that the central task is one of managing a wide assortment of risks,” according to the White House blog. “The review group is hopeful that the recommendations made here might prove helpful in striking the right balance. Free nations must protect themselves, and nations that protect themselves must remain free.”

Sweeping Changes Suggested

For starters, the report supports legislation to terminate the storage of bulk telephony metadata by the government under Section 215 of the Foreign Intelligence Surveillance Act (FISC). It also urges Congress to enact legislation authorizing telephone, Internet, and other providers to disclose publicly general information about orders they receive directing them to provide information to the government.

Next, the report sets forth several steps that the government should take to protect the privacy of non-U.S. persons. The report also recommends a series of organizational changes and calls for President Obama to create a new process to approve sensitive intelligence activities, including policy makers responsible for U.S. economic policy.

Congress should create the position of Public Interest Advocate to represent the interests of privacy and civil liberties before the court, increase the transparency of FISC decisions, and change the process by which judges are appointed, the group recommended. And it urged the creation of a newly chartered, strengthened, and independent Civil Liberties and Privacy Protection Board with authority to review government activity relating to foreign intelligence rather than only for counterterrorism.

A Good First Step

With respect to the NSA, the group proposed that the director position should be Senate-confirmed, civilians should be eligible to hold the position, and U.S. Cyber Command should be separated from the NSA so that a single person would no longer wear two hats. The report recommends that the U.S. government fully support and not undermine efforts to create strong global encryption standards, and take other measures to prompt prosperity, security, and openness on the Internet. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



 Data Security
1. Lessons from Verizon's Threat Report
2. Verizon Report Exposes Cyberthreats
3. Heartbleed Exploit Could Cost Millions
4. Michaels: Nearly 3M Cards Breached
5. Malware Targets Facebook Users


Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Google Maps, Now with Time Travel
  Lessons from Verizon's Threat Report
  NYPD Twitter Campaign Backfires
  Net Gets Faster, But Easier to Attack
  OnePlus One Boasts Android Weapon

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
Navigation
CIO Today
Home/Top News | Enterprise Software | Enterprise Hardware | Big Data | Network Security | Cloud Computing | CRM Systems
Data Storage | Operating Systems | Communications | CIO Issues | Mobile Tech | Chips & Processors | World Wide Web
Business Briefing | After Hours | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 CIO Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.