Feeds

Going lo-tech to avoid NSA snooping? Unlucky - they read snailmail too

US Postal Service scoops metadata from your letters: report

Internet Security Threat Report 2014

Privacy-conscious US citizens looking to go retro in the wake of the ongoing controversy about PRISM-related snooping and the NSA harvesting metadata on an industrial scale will find little refuge in snail mail.

The New York Times reports that the United States Postal Service photographs the exterior of every piece of mail going through the system as part of the Mail Isolation Control and Tracking programme. The data is retained for use by law enforcement as part of a scheme set up in the wake of anthrax attacks in late 2001 that killed five people, including two postal workers.

The dataset creates a means to go back in time and trace mail correspondence and was used by the FBI in a case involving the transmission of ricin-laced letters to President Obama and New York Mayor Michael R Bloomberg, says the paper.

Contents of letters are not recorded as part of the Mail Isolation Control and Tracking programme, which operates in conjunction with a decades-old "mail covers" scheme, which involves physically keeping tabs on mail sent to individuals either suspected of criminal or subversive activity.

Leslie Pickering, the owner of a bookshop in Buffalo, and a former spokesman for the Earth Liberation Front, a radical environmentalist group, claims he was among those targeted as part of the mail-covers scheme. He says he learned he was under watch after a handwritten card instructing postal workers to pay special attention to the letters and packages sent to his home arrived in his letter box after apparently being delivered by mistake, according to the NY Times.

Pickering claimed postal officials subsequently admitted they were tracking his mail without explaining why, or for how long, he and his family might have been monitored. NYT said postal officials had declined to comment on his claims.

Law enforcement agencies submit a request for a mail cover direct to the Postal Service, which is able to grant or deny a request without judicial review. By contrast, judges need to sign off wiretap requests. Mail cover requests (granted for 30 days, with possible extensions up to 120 days) are rarely refused, law enforcement officials told the NYT. Requests may relate to either criminal investigation or national security matters.

Criminal activity requests average 15,000 to 20,000 per year, according to unnamed law enforcement officials who spoke to the NYT on the condition of anonymity. The volume of anti-terrorism mail cover requests is unknown.

Law enforcement officials need warrants to actually open mail, but a surprising amount of information can be gleaned from the metadata on the outside of a letter or parcel.

"Court challenges to mail covers have generally failed because judges have ruled that there is no reasonable expectation of privacy for information contained on the outside of a letter," the NYT reports.

"Officials in both the Bush and Obama administrations, in fact, have used the mail-cover court rulings to justify the NSA's surveillance programs, saying the electronic monitoring amounts to the same thing as a mail cover. Congress briefly conducted hearings on mail cover programs in 1976, but has not revisited the issue."

Postal mail volumes are dropping but there were still more than 160 billion pieces of mail sent in the US last year. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.