Feeds

Going lo-tech to avoid NSA snooping? Unlucky - they read snailmail too

US Postal Service scoops metadata from your letters: report

Securing Web Applications Made Simple and Scalable

Privacy-conscious US citizens looking to go retro in the wake of the ongoing controversy about PRISM-related snooping and the NSA harvesting metadata on an industrial scale will find little refuge in snail mail.

The New York Times reports that the United States Postal Service photographs the exterior of every piece of mail going through the system as part of the Mail Isolation Control and Tracking programme. The data is retained for use by law enforcement as part of a scheme set up in the wake of anthrax attacks in late 2001 that killed five people, including two postal workers.

The dataset creates a means to go back in time and trace mail correspondence and was used by the FBI in a case involving the transmission of ricin-laced letters to President Obama and New York Mayor Michael R Bloomberg, says the paper.

Contents of letters are not recorded as part of the Mail Isolation Control and Tracking programme, which operates in conjunction with a decades-old "mail covers" scheme, which involves physically keeping tabs on mail sent to individuals either suspected of criminal or subversive activity.

Leslie Pickering, the owner of a bookshop in Buffalo, and a former spokesman for the Earth Liberation Front, a radical environmentalist group, claims he was among those targeted as part of the mail-covers scheme. He says he learned he was under watch after a handwritten card instructing postal workers to pay special attention to the letters and packages sent to his home arrived in his letter box after apparently being delivered by mistake, according to the NY Times.

Pickering claimed postal officials subsequently admitted they were tracking his mail without explaining why, or for how long, he and his family might have been monitored. NYT said postal officials had declined to comment on his claims.

Law enforcement agencies submit a request for a mail cover direct to the Postal Service, which is able to grant or deny a request without judicial review. By contrast, judges need to sign off wiretap requests. Mail cover requests (granted for 30 days, with possible extensions up to 120 days) are rarely refused, law enforcement officials told the NYT. Requests may relate to either criminal investigation or national security matters.

Criminal activity requests average 15,000 to 20,000 per year, according to unnamed law enforcement officials who spoke to the NYT on the condition of anonymity. The volume of anti-terrorism mail cover requests is unknown.

Law enforcement officials need warrants to actually open mail, but a surprising amount of information can be gleaned from the metadata on the outside of a letter or parcel.

"Court challenges to mail covers have generally failed because judges have ruled that there is no reasonable expectation of privacy for information contained on the outside of a letter," the NYT reports.

"Officials in both the Bush and Obama administrations, in fact, have used the mail-cover court rulings to justify the NSA's surveillance programs, saying the electronic monitoring amounts to the same thing as a mail cover. Congress briefly conducted hearings on mail cover programs in 1976, but has not revisited the issue."

Postal mail volumes are dropping but there were still more than 160 billion pieces of mail sent in the US last year. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.