Feeds

US ‘National Security’ surveillance up in 2000

Secret court authorizes FBI bugs and black bag jobs

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

US federal agents filed a record 1,005 applications to perform electronic surveillance and covert physical burglaries in supposed terrorism and espionage investigations last year, all of which were granted, according to US Department of Justice (DoJ) figures made public Wednesday.

The FBI's national security wiretapping in 2000 shattered the previous record of 886 applications in 1999, and took up the slack from an overall decrease in surveillance in conventional criminal investigations during the same period, according to figures the Department of Justice reported to Congress last week, obtained by the Federation of American Scientists (FAS) under the Freedom of Information Act.

The surveillance was authorized under the Foreign Intelligence Surveillance Act (FISA), a 1978 law that was originally intended to reign in the FBI and the intelligence community in the wake of decades of illegal domestic spying.

With FISA, Congress created a special five-judge panel in Washington, conveniently housed within Justice Department headquarters, to hear secret FBI testimony and issue orders for electronic surveillance against foreign nationals or US citizens suspected of serving foreign governments. The Foreign Intelligence Surveillance Court operates under tight security, and its orders are never made public.

Secret evidence allowed

In addition to electronic surveillance, the panel also issues special "sneak and peek" search warrants allowing FBI agents to covertly enter a home or office to copy letters, journals and diaries, plant bugs, steal encryption keys, or install monitoring software or hardware on a target's computer.

The 2000 FISA report does not break down how many orders were for electronic surveillance, and how many were for physical intrusions.

Under FISA, a surveillance target is never notified that he or she was watched, except in the rare case where criminal charges are filed. Even then defendants are not entitled to review or challenge the evidence used to establish "probable cause" for the surveillance -- a situation unique in American jurisprudence.

"As it stands now, the government has enormous authority to engage in surveillance and physical searches that might arguably be unconstitutional," says FAS's Steven Aftergood. "It's a troubling law, and there are at least some of us who think that it needs to be refined."

Last month, the US Supreme Court declined to hear the appeal of Theresa Squillacote, a former Pentagon lawyer, and her husband, Kurt Stand, who were convicted of espionage in part based on evidence obtained in 550 days of intimate FISA-authorized FBI bugging. An appeals court ruled that the couple had no right to examine the evidence and testimony underlying the surveillance.

As in previous years, not a single FISA request was denied in 2000. But that may reflect Justice Department restraint as much as courtroom rubber-stamping. In 1999, then Attorney General Janet Reno came under fire in Congress when it was learned that the DoJ refused to pursue a 1997 FBI request for FISA surveillance on then-espionage suspect Wen Ho Lee. In a Senate hearing in June of that year, Reno explained, "the Department determined that the evidence was insufficient to support a finding of probable cause."

Of last year's applications, 1,003 of were approved before the end of the year, and the remaining two were approved in January 2001. Nine requests submitted in 1999 were also approved last year, for a total of 1,012 national security warrants granted in 2000.

A separate report released by the Administrative Office of the US Courts this week reflects a second year of decreased court authorized electronic surveillance in ordinary criminal investigations. A total of 1,190 intercepts authorized by federal and state courts were completed in 2000, down five percent from 1999. Cellular telephones were the most popular technology for surveillance, with 691 wiretaps, and suspected drug offenders remain the most frequent targets.

© 2001 SecurityFocus.com, all rights reserved.

Related Story

FBI wiretaps increased on Y2K pretext

Mobile application security vulnerability report

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.