Feeds

US ‘National Security’ surveillance up in 2000

Secret court authorizes FBI bugs and black bag jobs

  • alert
  • submit to reddit

High performance access to file storage

US federal agents filed a record 1,005 applications to perform electronic surveillance and covert physical burglaries in supposed terrorism and espionage investigations last year, all of which were granted, according to US Department of Justice (DoJ) figures made public Wednesday.

The FBI's national security wiretapping in 2000 shattered the previous record of 886 applications in 1999, and took up the slack from an overall decrease in surveillance in conventional criminal investigations during the same period, according to figures the Department of Justice reported to Congress last week, obtained by the Federation of American Scientists (FAS) under the Freedom of Information Act.

The surveillance was authorized under the Foreign Intelligence Surveillance Act (FISA), a 1978 law that was originally intended to reign in the FBI and the intelligence community in the wake of decades of illegal domestic spying.

With FISA, Congress created a special five-judge panel in Washington, conveniently housed within Justice Department headquarters, to hear secret FBI testimony and issue orders for electronic surveillance against foreign nationals or US citizens suspected of serving foreign governments. The Foreign Intelligence Surveillance Court operates under tight security, and its orders are never made public.

Secret evidence allowed

In addition to electronic surveillance, the panel also issues special "sneak and peek" search warrants allowing FBI agents to covertly enter a home or office to copy letters, journals and diaries, plant bugs, steal encryption keys, or install monitoring software or hardware on a target's computer.

The 2000 FISA report does not break down how many orders were for electronic surveillance, and how many were for physical intrusions.

Under FISA, a surveillance target is never notified that he or she was watched, except in the rare case where criminal charges are filed. Even then defendants are not entitled to review or challenge the evidence used to establish "probable cause" for the surveillance -- a situation unique in American jurisprudence.

"As it stands now, the government has enormous authority to engage in surveillance and physical searches that might arguably be unconstitutional," says FAS's Steven Aftergood. "It's a troubling law, and there are at least some of us who think that it needs to be refined."

Last month, the US Supreme Court declined to hear the appeal of Theresa Squillacote, a former Pentagon lawyer, and her husband, Kurt Stand, who were convicted of espionage in part based on evidence obtained in 550 days of intimate FISA-authorized FBI bugging. An appeals court ruled that the couple had no right to examine the evidence and testimony underlying the surveillance.

As in previous years, not a single FISA request was denied in 2000. But that may reflect Justice Department restraint as much as courtroom rubber-stamping. In 1999, then Attorney General Janet Reno came under fire in Congress when it was learned that the DoJ refused to pursue a 1997 FBI request for FISA surveillance on then-espionage suspect Wen Ho Lee. In a Senate hearing in June of that year, Reno explained, "the Department determined that the evidence was insufficient to support a finding of probable cause."

Of last year's applications, 1,003 of were approved before the end of the year, and the remaining two were approved in January 2001. Nine requests submitted in 1999 were also approved last year, for a total of 1,012 national security warrants granted in 2000.

A separate report released by the Administrative Office of the US Courts this week reflects a second year of decreased court authorized electronic surveillance in ordinary criminal investigations. A total of 1,190 intercepts authorized by federal and state courts were completed in 2000, down five percent from 1999. Cellular telephones were the most popular technology for surveillance, with 691 wiretaps, and suspected drug offenders remain the most frequent targets.

© 2001 SecurityFocus.com, all rights reserved.

Related Story

FBI wiretaps increased on Y2K pretext

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.