Feeds

US ‘National Security’ surveillance up in 2000

Secret court authorizes FBI bugs and black bag jobs

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

US federal agents filed a record 1,005 applications to perform electronic surveillance and covert physical burglaries in supposed terrorism and espionage investigations last year, all of which were granted, according to US Department of Justice (DoJ) figures made public Wednesday.

The FBI's national security wiretapping in 2000 shattered the previous record of 886 applications in 1999, and took up the slack from an overall decrease in surveillance in conventional criminal investigations during the same period, according to figures the Department of Justice reported to Congress last week, obtained by the Federation of American Scientists (FAS) under the Freedom of Information Act.

The surveillance was authorized under the Foreign Intelligence Surveillance Act (FISA), a 1978 law that was originally intended to reign in the FBI and the intelligence community in the wake of decades of illegal domestic spying.

With FISA, Congress created a special five-judge panel in Washington, conveniently housed within Justice Department headquarters, to hear secret FBI testimony and issue orders for electronic surveillance against foreign nationals or US citizens suspected of serving foreign governments. The Foreign Intelligence Surveillance Court operates under tight security, and its orders are never made public.

Secret evidence allowed

In addition to electronic surveillance, the panel also issues special "sneak and peek" search warrants allowing FBI agents to covertly enter a home or office to copy letters, journals and diaries, plant bugs, steal encryption keys, or install monitoring software or hardware on a target's computer.

The 2000 FISA report does not break down how many orders were for electronic surveillance, and how many were for physical intrusions.

Under FISA, a surveillance target is never notified that he or she was watched, except in the rare case where criminal charges are filed. Even then defendants are not entitled to review or challenge the evidence used to establish "probable cause" for the surveillance -- a situation unique in American jurisprudence.

"As it stands now, the government has enormous authority to engage in surveillance and physical searches that might arguably be unconstitutional," says FAS's Steven Aftergood. "It's a troubling law, and there are at least some of us who think that it needs to be refined."

Last month, the US Supreme Court declined to hear the appeal of Theresa Squillacote, a former Pentagon lawyer, and her husband, Kurt Stand, who were convicted of espionage in part based on evidence obtained in 550 days of intimate FISA-authorized FBI bugging. An appeals court ruled that the couple had no right to examine the evidence and testimony underlying the surveillance.

As in previous years, not a single FISA request was denied in 2000. But that may reflect Justice Department restraint as much as courtroom rubber-stamping. In 1999, then Attorney General Janet Reno came under fire in Congress when it was learned that the DoJ refused to pursue a 1997 FBI request for FISA surveillance on then-espionage suspect Wen Ho Lee. In a Senate hearing in June of that year, Reno explained, "the Department determined that the evidence was insufficient to support a finding of probable cause."

Of last year's applications, 1,003 of were approved before the end of the year, and the remaining two were approved in January 2001. Nine requests submitted in 1999 were also approved last year, for a total of 1,012 national security warrants granted in 2000.

A separate report released by the Administrative Office of the US Courts this week reflects a second year of decreased court authorized electronic surveillance in ordinary criminal investigations. A total of 1,190 intercepts authorized by federal and state courts were completed in 2000, down five percent from 1999. Cellular telephones were the most popular technology for surveillance, with 691 wiretaps, and suspected drug offenders remain the most frequent targets.

© 2001 SecurityFocus.com, all rights reserved.

Related Story

FBI wiretaps increased on Y2K pretext

New hybrid storage solutions

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.