Feeds

CIPA – not as stupid as it sounds

But should the FBI be able to hide behind it?

  • alert
  • submit to reddit

Gartner critical capabilities for enterprise endpoint backup

FBI let off cyber snooping hook

The FBI this week managed to wriggle out of explaining exactly how it gained evidence that mobster Nicodemo Scarfo was involved in illegal gambling and loan sharking. The fact that the FBI got away with installing key logging software onto Scarfo's computer despite not having a bugging warrant caused concern for reader Jason Blalock.

A Yank here. Just wanted to let you know that the CIPA is not *quite* as stupid as it sounds. It was intended to only be invoked in wartime or other limited circumstances. And the point was so that a court could not order the miltiary to cough up full specs, on say, the latest superbomber we've got under development. It does make a certain amount of sense from a military POV. (remember the fuss during the Gulf War with CNN reporting troop movements before Iraq knew about them?)

However, the FBI using it as a shield for a keysniffer *is* absolutely ludicrous, and I can't believe the judge is letting them get away with it.

The CIPA was definately not meant to let the government get away with spying on its own citizens. It's a total abuse of the act. The conspiracy theorist in me wants to think they've got their sniffer planted on the desks of foreign leaders, which would be just about the only case that would allow them to legitimately invoke the CIPA.

Far more likely though, it's simply that they KNOW they nabbed the guy with illegal evidence and don't want to give him up. (and virtually no one else in the country thinks that keysniffing should not need a search warrant)

5 things you didn’t know about cloud backup

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.