Feeds

CIPA – not as stupid as it sounds

But should the FBI be able to hide behind it?

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

FBI let off cyber snooping hook

The FBI this week managed to wriggle out of explaining exactly how it gained evidence that mobster Nicodemo Scarfo was involved in illegal gambling and loan sharking. The fact that the FBI got away with installing key logging software onto Scarfo's computer despite not having a bugging warrant caused concern for reader Jason Blalock.

A Yank here. Just wanted to let you know that the CIPA is not *quite* as stupid as it sounds. It was intended to only be invoked in wartime or other limited circumstances. And the point was so that a court could not order the miltiary to cough up full specs, on say, the latest superbomber we've got under development. It does make a certain amount of sense from a military POV. (remember the fuss during the Gulf War with CNN reporting troop movements before Iraq knew about them?)

However, the FBI using it as a shield for a keysniffer *is* absolutely ludicrous, and I can't believe the judge is letting them get away with it.

The CIPA was definately not meant to let the government get away with spying on its own citizens. It's a total abuse of the act. The conspiracy theorist in me wants to think they've got their sniffer planted on the desks of foreign leaders, which would be just about the only case that would allow them to legitimately invoke the CIPA.

Far more likely though, it's simply that they KNOW they nabbed the guy with illegal evidence and don't want to give him up. (and virtually no one else in the country thinks that keysniffing should not need a search warrant)

Intelligent flash storage arrays

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.