About Me

My photo
This site is the inspiration of a former reporter/photographer for one of New England's largest daily newspapers and for various magazines. The intent is to direct readers to interesting political articles, and we urge you to visit the source sites. Any comments may be noted on site or directed to KarisChaf at gmail.

Tuesday, March 25, 2014

Report: Obama to call for ending NSA storage of phone metadata -- By Meghashyam Mali, The Washington Examiner


The National Security Administration's campus in Fort Meade, Md., is pictured on June 6. (AP Photo/Patrick Semansky)President Obama is preparing to unveil a proposal to end the National Security Agency's collection and storage of bulk phone metadata, according to a report.

The New York Times reported late Monday that the plan would require the government to get authorization from the Foreign Intelligence surveillance Court before accessing the data, which would be stored by private phone companies.

The government would need to specify which phone numbers they wanted data on and demonstrate to a judge a link to possible terror threats. The government could seek data on callers two “hops” removed from the initial number.


But the phone data would be kept in the possession of phone companies not the NSA or other government agencies.

Furthermore, according to the Times, the phone companies would only be required to keep the phone data for 18 months -- the length of time they currently are required to do so.

The administration would reauthorize the NSA to continue collecting phone data for another 90 days until the new system is set into place, the Times reported.

The changes would be the most sweeping reforms to the NSA since leaker Edward Snowden's disclosures about the agency's surveillance of phone and internet communications.

The revelations sparked a firestorm of debate with civil libertarians calling for greater privacy protections. But many lawmakers warned that any reforms would need to be weighed carefully to avoid undercutting the nation's security.

(Click link below to read more)
READ MORE Sphere: Related Content

No comments:

Post a Comment