Feeds

Wiretapping, FISA, and the NSA

I always feel like somebody's watching me..

Beginner's guide to SSL certificates

In the December 2000 criminal prosecution of Osama Bin Laden for the first World Trade Center attack, the Court found that the Fourth Amendment warrant requirement did not apply to searches conducted on foreign nationals overseas - indeed, there was no mechanism for a judge in Manhattan to order a search or interception in Nairobi. But that is overseas. So if the wiretaps were done by the US government against foreign targets overseas, everything would have been ok. But the revelations were that the government was targeting US ersons for intercepts based upon some "connection" to some overseas person.

The first assumption under federal law is that all wiretapping done in this country or wiretapping directed against US citizens or permanent residents is illegal. Three separate laws make it a crime to engage in electronic surveillance unless specifically authorized by statute. 50 USC 1809(a); 47 USC 605 and 18 USC 2511. There are several exceptions to this presumption, including consent of one or all of the parties to the communication, interception by the provider of telecommunications services in the ordinary course of business for certain purposes. These are interceptions that do not implicate a reasonable expectation of privacy, and finally, interceptions done pursuant to court orders. That is, orders by the judicial branch.

For interception of the contents of communications within the United States (whether among citizens or not) the government (typically the FBI) can get a warrant under the federal wiretap statute (called Title III) or the Electronic Communications Privacy Act. Such warrants are difficult to obtain, must be supported by a finding of probable cause to believe that a crime has been or will be committed and that the tap will uncover evidence of that crime, and that reasonable steps have been taken to minimize the possibility that non-criminal conversations (or emails) will be intercepted and examined. As part of the USA-PATRIOT Act, Congress authorized so-called "roving" wiretaps, which allow the FBI and not the Court to decide that a target was now using a different telephone, and to transfer the wiretap authority from one phone to another. This resulted in reports of hundreds of erroneous wiretaps for the wrong telephone number, address, or email address.

But Title III wiretap orders apply only to findings of criminal activity. Now it is difficult for me to imagine a circumstance where someone could be part of a terrorist organization, planning or discussing terrorist activities and not be suspected of a crime. Terrorism is a crime. Murder is a crime. Destruction of property is a crime. Conspiracy is a crime. Money laundering, fraud, immigration fraud, false statements, counterfeiting - all of these are crimes. In the recent Spielberg movie Munich, Mossad agents assigned to assassinate those responsible for planning the abduction and murder of Israeli Olympic athletes agonize over the legality of their actions, but ultimately focus on its necessity. Niceties of the law are rarely debated on the battlefield, and according to the current administration, the battlefield is everywhere and forever.

Security for virtualized datacentres

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
OECD lashes out at tax avoiding globocorps' location-flipping antics
You hear that, Amazon, Google, Microsoft et al?
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.