{"id":24478,"date":"2014-07-02T18:41:38","date_gmt":"2014-07-02T22:41:38","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24478"},"modified":"2014-07-02T18:41:38","modified_gmt":"2014-07-02T22:41:38","slug":"u-s-privacy-watchdog-says-nsa-spying-is-valuable-and-effective","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/u-s-privacy-watchdog-says-nsa-spying-is-valuable-and-effective.php","title":{"rendered":"U.S. Privacy Watchdog Says NSA Spying Is &#8216;Valuable and Effective&#8217;"},"content":{"rendered":"<p><p>The  National Security Administration (NSA) headquarters campus in  Fort Meade, Maryland.  <\/p>\n<p>    Image: Patrick Semansky\/Associated Press  <\/p>\n<p>      By Lorenzo      Franceschi-Bicchierai2014-07-02 17:00:30 UTC    <\/p>\n<p>    The NSA Internet spying programs, including PRISM, have been    \"valuable and effective\" in protecting the United States,    according to a new report by a U.S. independent government    privacy watchdog published on Wednesday.  <\/p>\n<p>    The bipartisan Privacy and Civil Liberties Oversight Board    (PCLOB)    found that the NSA's collection of Internet data is line with    the constitutional and has been key to disrupting terrorist    attacks in the U.S. and abroad. The 191-page report focused on Section 702 of the FISA    Amendments Act of 2008, the legal basis for NSA's PRISM    and other Internet surveillance programs designed to vacuum    large amounts of Internet-based communications.  <\/p>\n<p>    The report, which focused on the programs' effectiveness and    whether they strike a balance between protecting American    national security and honoring citizens' civil liberties, can    be considered a win for the NSA and the intelligence community.    In January, another report by the PCLOB found that the NSA bulk    phone metadata collection program, used to collect the phone    records of virtually all Americans, was illegal and had a    \"minimal\" impact on stopping terrorism.  <\/p>\n<p>    PRISM and the other Internet surveillance programs, on the    other hand, had some impact, according to the report. In 20    cases, Internet surveillance \"was used in support of an already    existing counterterrorism investigation,\" while in another 30    cases, the surveillance \"was the initial catalyst that    identified previously unknown terrorist operatives and\/or    plots.\"  <\/p>\n<p>    In the past, the NSA claimed its Internet    surveillance programs had helped foil more than 50 terrorist    attacks. This claim was debunked in January by    another independent study, this one by the New America    Foundation.  <\/p>\n<p>    The board, which is comprised five members appointed by    President Barack Obama,    found that, in general, the programs have \"reasonable\"    safeguards to protect American's privacy rights, but    some elements push the surveillance \"close to    the line of constitutional reasonableness.\" In    particular, the board was concerned about the amount of    Americans' data these programs collect \"incidentally\" and by    the rules that allow the NSA and the CIA to search through that    data.  <\/p>\n<p>    Privacy and civil liberties advocates criticized the report,    saying it failed to address the NSA's warrantless wiretapping    of Internet communications.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/mashable.com\/2014\/07\/02\/privacy-board-nsa-internet-spying-report\/?utm_campaign=Mash-Prod-RSS-Feedburner-All-Partial&utm_cid=Mash-Prod-RSS-Feedburner-All-Partial&utm_medium=feed&utm_source=rss\/RK=0\/RS=.gnZshXdsypGVcf78MowD9XvYCM-\" title=\"U.S. Privacy Watchdog Says NSA Spying Is 'Valuable and Effective'\">U.S. Privacy Watchdog Says NSA Spying Is 'Valuable and Effective'<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The National Security Administration (NSA) headquarters campus in Fort Meade, Maryland. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-24478","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24478"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24478"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24478\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}