Feeds

Wiretapping, FISA, and the NSA

I always feel like somebody's watching me..

Secure remote control for conventional and virtual desktops

In the December 2000 criminal prosecution of Osama Bin Laden for the first World Trade Center attack, the Court found that the Fourth Amendment warrant requirement did not apply to searches conducted on foreign nationals overseas - indeed, there was no mechanism for a judge in Manhattan to order a search or interception in Nairobi. But that is overseas. So if the wiretaps were done by the US government against foreign targets overseas, everything would have been ok. But the revelations were that the government was targeting US ersons for intercepts based upon some "connection" to some overseas person.

The first assumption under federal law is that all wiretapping done in this country or wiretapping directed against US citizens or permanent residents is illegal. Three separate laws make it a crime to engage in electronic surveillance unless specifically authorized by statute. 50 USC 1809(a); 47 USC 605 and 18 USC 2511. There are several exceptions to this presumption, including consent of one or all of the parties to the communication, interception by the provider of telecommunications services in the ordinary course of business for certain purposes. These are interceptions that do not implicate a reasonable expectation of privacy, and finally, interceptions done pursuant to court orders. That is, orders by the judicial branch.

For interception of the contents of communications within the United States (whether among citizens or not) the government (typically the FBI) can get a warrant under the federal wiretap statute (called Title III) or the Electronic Communications Privacy Act. Such warrants are difficult to obtain, must be supported by a finding of probable cause to believe that a crime has been or will be committed and that the tap will uncover evidence of that crime, and that reasonable steps have been taken to minimize the possibility that non-criminal conversations (or emails) will be intercepted and examined. As part of the USA-PATRIOT Act, Congress authorized so-called "roving" wiretaps, which allow the FBI and not the Court to decide that a target was now using a different telephone, and to transfer the wiretap authority from one phone to another. This resulted in reports of hundreds of erroneous wiretaps for the wrong telephone number, address, or email address.

But Title III wiretap orders apply only to findings of criminal activity. Now it is difficult for me to imagine a circumstance where someone could be part of a terrorist organization, planning or discussing terrorist activities and not be suspected of a crime. Terrorism is a crime. Murder is a crime. Destruction of property is a crime. Conspiracy is a crime. Money laundering, fraud, immigration fraud, false statements, counterfeiting - all of these are crimes. In the recent Spielberg movie Munich, Mossad agents assigned to assassinate those responsible for planning the abduction and murder of Israeli Olympic athletes agonize over the legality of their actions, but ultimately focus on its necessity. Niceties of the law are rarely debated on the battlefield, and according to the current administration, the battlefield is everywhere and forever.

Beginner's guide to SSL certificates

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
Inside the EYE of the TORnado: From Navy spooks to Silk Road
It's hard enough to peel the onion, are you hard enough to eat the core?
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.