Feeds

CIPA – not as stupid as it sounds

But should the FBI be able to hide behind it?

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

FBI let off cyber snooping hook

The FBI this week managed to wriggle out of explaining exactly how it gained evidence that mobster Nicodemo Scarfo was involved in illegal gambling and loan sharking. The fact that the FBI got away with installing key logging software onto Scarfo's computer despite not having a bugging warrant caused concern for reader Jason Blalock.

A Yank here. Just wanted to let you know that the CIPA is not *quite* as stupid as it sounds. It was intended to only be invoked in wartime or other limited circumstances. And the point was so that a court could not order the miltiary to cough up full specs, on say, the latest superbomber we've got under development. It does make a certain amount of sense from a military POV. (remember the fuss during the Gulf War with CNN reporting troop movements before Iraq knew about them?)

However, the FBI using it as a shield for a keysniffer *is* absolutely ludicrous, and I can't believe the judge is letting them get away with it.

The CIPA was definately not meant to let the government get away with spying on its own citizens. It's a total abuse of the act. The conspiracy theorist in me wants to think they've got their sniffer planted on the desks of foreign leaders, which would be just about the only case that would allow them to legitimately invoke the CIPA.

Far more likely though, it's simply that they KNOW they nabbed the guy with illegal evidence and don't want to give him up. (and virtually no one else in the country thinks that keysniffing should not need a search warrant)

Build a business case: developing custom apps

More from The Register

next story
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
Nuts to your poncey hipster coffees, I want a TESLA ELECTRO-CAFE
Examining the frothy disconnect in indie cafe culture
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?