Feeds

The spy suit wars

A nation divided

Choosing a cloud hosting partner with confidence

Valley Justice Two United States District Court judges recently handed down decisions in high-profile cases involving wiretapping and alleged records aggregation on behalf of the National Security Agency (NSA). The suits were brought against AT&T by plaintiffs in the Northern District of California with the legal “expertise” of the Electronic Frontier Foundation (EFF), and in the Northern District of Illinois with the help of the American Civil Liberties Union (ACLU.) The suits allege that AT&T violated constitutional and statutory protections against the disclosure of private information by providing telephone communications and subscriber information to the federal government.

Now, we know what you’re thinking, but the EFF actually won this round. The judge for the Northern District of California decided that those plaintiffs’ case against the telecommunications juggernaut could continue for the time being, while the Illinois judge determined that the “state secrets” doctrine precluded the plaintiffs in that suit from prosecuting the litigation in its current form.

The state secrets doctrine is an evidentiary rule that prohibits disclosure of, well, state secrets. The revelation of those secrets must threaten national security for the rule to apply, and the rule usually bars an airing of military plans or, as in the present instance, espionage operations. (In other words, the clandestine diddling of interns doesn’t count.)

The doctrine was adopted early on in the U.S. legal system, and, like everything else in the States’ legal system, was copied from the English common law. Once it reared its ambiguous head, however, it languished in the realm of legal obscurity for a while – a leading case is still one involving an espionage contract from the Civil War – but has received more and more development as the military-industrial complex has encroached further and further into our lives. The first modern framing of the doctrine occurred in the early part of the Cold War, and it has since popped up in cases involving the Pentagon Papers, CIA contracts and military storehouses.

The state secrets doctrine received remarkably similar treatment by the courts in this instance, considering how flexible and subjective it is. The different outcomes resulted from differences in the claims that the plaintiffs presented to the courts. The California plaintiffs pleaded a wide range of constitutional and statutory violations stemming from both the interception of the content of telephone conversations and the alleged production of customer records; the Illinois case only contained a claim of a violation of the Electronic Communications Privacy Act as a result of the alleged transmission of customer records.

The details behind these current cases have already received a lot of press, including the technical particulars of the program provided by former AT&T employee Mark Klein. The court has sealed most of the documents that Klein obtained from AT&T, since the company claims that they contain proprietary and trade secret information. Statements made by Klein in public, however, describe rooms in AT&T’s San Francisco offices where employees whom the NSA interviewed for a “secret job” installed equipment. These rooms sat adjacent to the area where public phone calls were routed.

Klein also detailed how fiber optic light signals were diverted to a secret room which contained a Narus STA 6400, known for its abilities to search for patterns among large amounts of data.

These revelations seem to blow the state secrets doctrine out of the water, since the workings of the program have now been aired on a very public clothesline. But the California court was quick to note, that the press is not always accurate (the hell you say!), and that verification of accurate stories in the press is not always harmless to national security.

At issue is whether enemies of the U.S. could use the information gained through the lawsuits to decrease the likelihood of their discovery, thus increasing the chance of harm to the country. Verification of the program might lead enemies to avoid AT&T, while proof that it never existed might encourage them to use the company’s services.

Choosing a cloud hosting partner with confidence

Next page: Bootnote

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.