Feeds

Court limits in-car FBI spying

But only because it crippled some safety features

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

An appeals court this week put the brakes on an FBI surveillance technique that turns an automobile driver's on-board vehicle navigation system into a covert eavesdropping device, after finding that the spying effectively disables the system's emergency and roadside assistance features.

The case arose from a 2001 FBI surveillance operation in Las Vegas, in which agents obtained a court order compelling a telematics company to secretly activate the stolen vehicle recovery feature in a customer's car. The feature, designed to listen-in on car thieves as they cruise around in a stolen auto, turns on a dashboard microphone and pipes conversations out over a cellphone connection - normally to the company's response center, but in this case to an FBI listening pos0t.

After initially complying for 30 days, the company asked a federal judge to block the order. It lost, and filed the appeal with 9th U.S. Circuit Court of Appeals while complying with the order. The proceeding were handled in strict secrecy, and the text of the final ruling omits the name of the company. Geri Lama, a spokesperson for General Motors subsidiary OnStar, says it wasn't them.

Court records strongly point to OnStar's Texas-based competitor ATX Technologies, which makes the "Tele Aid" systems used in Mercedes vehicles: the description fits the Tele Aid systems, and the Dallas-based attorney listed as arguing the appeal is also representing ATX in unrelated civil litigation in Texas. ATX spokesman Gary Wallace said he couldn't immediately comment.

Emergency Services Blocked

Under federal law, the FBI can obtain court orders compelling telecommunications companies, ISPs, landlords and others to assist the Bureau in spying on customers. But the law requires that surveillance in such cases be conducted "unobtrusively and with a minimum of interference with the services" provided by the company. With the navigation system's cellular link dedicated full time to eavesdropping, the system had no way to communicate with the company's response center if the roadside assistance or emergency reporting features were activated, according to the court's split 2-1 decision.

"Pressing the emergency button and activation of the car's airbags, instead of automatically contacting the Company, would simply emit a tone over the already open phone line," the majority wrote. "[T]he FBI, however well-intentioned, is not in the business of providing emergency road services, and might well have better things to do when listening in than respond with such services... The result was that the Company could no longer supply any of the various services it had promised its customer, including assurance of response in an emergency."

The decision, released Tuesday, is only binding in the 9th Circuit, which covers eight western U.S. states and Hawaii. Other federal circuits have not addressed the issue.

Despite the reversal, David Sobel, an attorney with the Electronic Privacy Information Center, says the ruling is not a victory for privacy. "Although the bottom line is that the surveillance order was rejected, the real effect of it is that this kind of monitoring is permissible as long it does not interfere with the service," says Sobel. "It underscores the fact that it's becoming increasingly difficult to escape the reach of surveillance capabilities."

Copyright ©

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.