Feeds

Hundreds of records unlawfully intercepted by FBI

Complex interception laws confuse Feds and ISPs

Internet Security Threat Report 2014

An internal audit has discovered that the FBI overstepped the mark in intercepting communication records at least 1,000 times since 2002.

The figures - based on an analysis of 10 per cent of the bureau's national security investigations over the last five years - are far higher than estimates of 22 wiretap "mistakes" in a Justice Department study released as recently as March.

The latest study blames the majority of violations of lawful interception rules or FBI rules on instances where telephone firms or ISPs gave agents the phone call records of the wrong people, or more information than was requested. Feds kept the information anyway.

More seriously, 24 of the freshly-unearthed violations involve agents requesting and obtaining information without lawful authority. Only two examples of such serious violation were reported in the Justice Department's March report (which covered a much smaller sample), the Washington Post reports.

FBI officials said the audit failed to reveal any deliberate attempts to violate surveillance laws. The issues identified in the report are blamed on inadequate knowledge on the part of many agents over the complex rules involved in serving so-called National Security Letters, or NSLs - agency demands for information from telecoms firms on terror suspects or others suspected of serious crimes. ®

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?