Feeds

Going lo-tech to avoid NSA snooping? Unlucky - they read snailmail too

US Postal Service scoops metadata from your letters: report

High performance access to file storage

Privacy-conscious US citizens looking to go retro in the wake of the ongoing controversy about PRISM-related snooping and the NSA harvesting metadata on an industrial scale will find little refuge in snail mail.

The New York Times reports that the United States Postal Service photographs the exterior of every piece of mail going through the system as part of the Mail Isolation Control and Tracking programme. The data is retained for use by law enforcement as part of a scheme set up in the wake of anthrax attacks in late 2001 that killed five people, including two postal workers.

The dataset creates a means to go back in time and trace mail correspondence and was used by the FBI in a case involving the transmission of ricin-laced letters to President Obama and New York Mayor Michael R Bloomberg, says the paper.

Contents of letters are not recorded as part of the Mail Isolation Control and Tracking programme, which operates in conjunction with a decades-old "mail covers" scheme, which involves physically keeping tabs on mail sent to individuals either suspected of criminal or subversive activity.

Leslie Pickering, the owner of a bookshop in Buffalo, and a former spokesman for the Earth Liberation Front, a radical environmentalist group, claims he was among those targeted as part of the mail-covers scheme. He says he learned he was under watch after a handwritten card instructing postal workers to pay special attention to the letters and packages sent to his home arrived in his letter box after apparently being delivered by mistake, according to the NY Times.

Pickering claimed postal officials subsequently admitted they were tracking his mail without explaining why, or for how long, he and his family might have been monitored. NYT said postal officials had declined to comment on his claims.

Law enforcement agencies submit a request for a mail cover direct to the Postal Service, which is able to grant or deny a request without judicial review. By contrast, judges need to sign off wiretap requests. Mail cover requests (granted for 30 days, with possible extensions up to 120 days) are rarely refused, law enforcement officials told the NYT. Requests may relate to either criminal investigation or national security matters.

Criminal activity requests average 15,000 to 20,000 per year, according to unnamed law enforcement officials who spoke to the NYT on the condition of anonymity. The volume of anti-terrorism mail cover requests is unknown.

Law enforcement officials need warrants to actually open mail, but a surprising amount of information can be gleaned from the metadata on the outside of a letter or parcel.

"Court challenges to mail covers have generally failed because judges have ruled that there is no reasonable expectation of privacy for information contained on the outside of a letter," the NYT reports.

"Officials in both the Bush and Obama administrations, in fact, have used the mail-cover court rulings to justify the NSA's surveillance programs, saying the electronic monitoring amounts to the same thing as a mail cover. Congress briefly conducted hearings on mail cover programs in 1976, but has not revisited the issue."

Postal mail volumes are dropping but there were still more than 160 billion pieces of mail sent in the US last year. ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.