Feeds

The spy suit wars

A nation divided

The essential guide to IT transformation

Valley Justice Two United States District Court judges recently handed down decisions in high-profile cases involving wiretapping and alleged records aggregation on behalf of the National Security Agency (NSA). The suits were brought against AT&T by plaintiffs in the Northern District of California with the legal “expertise” of the Electronic Frontier Foundation (EFF), and in the Northern District of Illinois with the help of the American Civil Liberties Union (ACLU.) The suits allege that AT&T violated constitutional and statutory protections against the disclosure of private information by providing telephone communications and subscriber information to the federal government.

Now, we know what you’re thinking, but the EFF actually won this round. The judge for the Northern District of California decided that those plaintiffs’ case against the telecommunications juggernaut could continue for the time being, while the Illinois judge determined that the “state secrets” doctrine precluded the plaintiffs in that suit from prosecuting the litigation in its current form.

The state secrets doctrine is an evidentiary rule that prohibits disclosure of, well, state secrets. The revelation of those secrets must threaten national security for the rule to apply, and the rule usually bars an airing of military plans or, as in the present instance, espionage operations. (In other words, the clandestine diddling of interns doesn’t count.)

The doctrine was adopted early on in the U.S. legal system, and, like everything else in the States’ legal system, was copied from the English common law. Once it reared its ambiguous head, however, it languished in the realm of legal obscurity for a while – a leading case is still one involving an espionage contract from the Civil War – but has received more and more development as the military-industrial complex has encroached further and further into our lives. The first modern framing of the doctrine occurred in the early part of the Cold War, and it has since popped up in cases involving the Pentagon Papers, CIA contracts and military storehouses.

The state secrets doctrine received remarkably similar treatment by the courts in this instance, considering how flexible and subjective it is. The different outcomes resulted from differences in the claims that the plaintiffs presented to the courts. The California plaintiffs pleaded a wide range of constitutional and statutory violations stemming from both the interception of the content of telephone conversations and the alleged production of customer records; the Illinois case only contained a claim of a violation of the Electronic Communications Privacy Act as a result of the alleged transmission of customer records.

The details behind these current cases have already received a lot of press, including the technical particulars of the program provided by former AT&T employee Mark Klein. The court has sealed most of the documents that Klein obtained from AT&T, since the company claims that they contain proprietary and trade secret information. Statements made by Klein in public, however, describe rooms in AT&T’s San Francisco offices where employees whom the NSA interviewed for a “secret job” installed equipment. These rooms sat adjacent to the area where public phone calls were routed.

Klein also detailed how fiber optic light signals were diverted to a secret room which contained a Narus STA 6400, known for its abilities to search for patterns among large amounts of data.

These revelations seem to blow the state secrets doctrine out of the water, since the workings of the program have now been aired on a very public clothesline. But the California court was quick to note, that the press is not always accurate (the hell you say!), and that verification of accurate stories in the press is not always harmless to national security.

At issue is whether enemies of the U.S. could use the information gained through the lawsuits to decrease the likelihood of their discovery, thus increasing the chance of harm to the country. Verification of the program might lead enemies to avoid AT&T, while proof that it never existed might encourage them to use the company’s services.

5 things you didn’t know about cloud backup

Next page: Bootnote

More from The Register

next story
Microsoft exits climate denier lobby group
ALEC will have to do without Redmond, it seems
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?