FBI adopts invasive Internet surveillance technique

Status
Not open for further replies.

xd9fan

Member
Joined
Sep 8, 2005
Messages
1,858
Location
Under tyranny in Midwest
By Declan McCullagh, CNET News.com
Published on ZDNet News: January 30, 2007, 4:00 AM PT

The FBI appears to have adopted an invasive Internet surveillance technique that collects far more data on innocent Americans than previously has been disclosed.

Instead of recording only what a particular suspect is doing, agents conducting investigations appear to be assembling the activities of thousands of Internet users at a time into massive databases, according to current and former officials. That database can subsequently be queried for names, e-mail addresses or keywords.

Such a technique is broader and potentially more intrusive than the FBI's Carnivore surveillance system, later renamed DCS1000. It raises concerns similar to those stirred by widespread Internet monitoring that the National Security Agency is said to have done, according to documents that have surfaced in one federal lawsuit, and may stretch the bounds of what's legally permissible.

Call it the vacuum-cleaner approach. It's employed when police have obtained a court order and an Internet service provider can't "isolate the particular person or IP address" because of technical constraints, says Paul Ohm, a former trial attorney at the Justice Department's Computer Crime and Intellectual Property Section. (An Internet Protocol address is a series of digits that can identify an individual computer.)

That kind of full-pipe surveillance can record all Internet traffic, including Web browsing--or, optionally, only certain subsets such as all e-mail messages flowing through the network. Interception typically takes place inside an Internet provider's network at the junction point of a router or network switch.

The technique came to light at the Search & Seizure in the Digital Age symposium held at Stanford University's law school on Friday. Ohm, who is now a law professor at the University of Colorado at Boulder, and Richard Downing, a CCIPS assistant deputy chief, discussed it during the symposium.

In a telephone conversation afterward, Ohm said that full-pipe recording has become federal agents' default method for Internet surveillance. "You collect wherever you can on the (network) segment," he said. "If it happens to be the segment that has a lot of IP addresses, you don't throw away the other IP addresses. You do that after the fact."

"You intercept first and you use whatever filtering, data mining to get at the information about the person you're trying to monitor," he added.

On Monday, a Justice Department representative would not immediately answer questions about this kind of surveillance technique.

"What they're doing is even worse than Carnivore," said Kevin Bankston, a staff attorney at the Electronic Frontier Foundation who attended the Stanford event. "What they're doing is intercepting everyone and then choosing their targets."

When the FBI announced two years ago it had abandoned Carnivore, news reports said that the bureau would increasingly rely on Internet providers to conduct the surveillance and reimburse them for costs. While Carnivore was the subject of congressional scrutiny and outside audits, the FBI's current Internet eavesdropping techniques have received little attention.

Carnivore apparently did not perform full-pipe recording. A technical report (PDF: "Independent Technical Review of the Carnivore System") from December 2000 prepared for the Justice Department said that Carnivore "accumulates no data other than that which passes its filters" and that it saves packets "for later analysis only after they are positively linked by the filter settings to a target."
One reason why the full-pipe technique raises novel legal questions is that under federal law, the FBI must perform what's called "minimization."

Federal law says that agents must "minimize the interception of communications not otherwise subject to interception" and keep the supervising judge informed of what's happening. Minimization is designed to provide at least a modicum of privacy by limiting police eavesdropping on innocuous conversations.

Prosecutors routinely hold presurveillance "minimization meetings" with investigators to discuss ground rules. Common investigatory rules permit agents to listen in on a phone call for two minutes at a time, with at least one minute elapsing between the spot-monitoring sessions.

That section of federal law mentions only real-time interception--and does not explicitly authorize the creation of a database with information on thousands of innocent targets.

But a nearby sentence adds: "In the event the intercepted communication is in a code or foreign language, and an expert in that foreign language or code is not reasonably available during the interception period, minimization may be accomplished as soon as practicable after such interception."

Downing, the assistant deputy chief at the Justice Department's computer crime section, pointed to that language on Friday. Because digital communications amount to a foreign language or code, he said, federal agents are legally permitted to record everything and sort through it later. (Downing stressed that he was not speaking on behalf of the Justice Department.)

"Take a look at the legislative history from the mid '90s," Downing said. "It's pretty clear from that that Congress very much intended it to apply to electronic types of wiretapping."

EFF's Bankston disagrees. He said that the FBI is "collecting and apparently storing indefinitely the communications of thousands--if not hundreds of thousands--of innocent Americans in violation of the Wiretap Act and the 4th Amendment to the Constitution."

Marc Rotenberg, director of the Electronic Privacy Information Center in Washington, D.C., said a reasonable approach would be to require that federal agents only receive information that's explicitly permitted by the court order. "The obligation should be on both the (Internet provider) and the government to make sure that only the information responsive to the warrant is disclosed to the government," he said.

Courts have been wrestling with minimization requirements for over a generation. In a 1978 Supreme Court decision, Scott v. United States, the justices upheld police wiretaps of people suspected of selling illegal drugs.

But in his majority opinion, Justice William Rehnquist said that broad monitoring to nab one suspect might go too far. "If the agents are permitted to tap a public telephone because one individual is thought to be placing bets over the phone, substantial doubts as to minimization may arise if the agents listen to every call which goes out over that phone regardless of who places the call," he wrote.

Another unanswered question is whether a database of recorded Internet communications can legally be mined for information about unrelated criminal offenses such as drug use, copyright infringement or tax crimes. One 1978 case, U.S. v. Pine, said that investigators could continue to listen in on a telephone line when other illegal activities--not specified in the original wiretap order--were being discussed. Those discussions could then be used against a defendant in a criminal prosecution.

Ohm, the former Justice Department attorney who presented a paper on the Fourth Amendment, said he has doubts about the constitutionality of full-pipe recording. "The question that's interesting, although I don't know whether it's so clear, is whether this is illegal, whether it's constitutional," he said. "Is Congress even aware they're doing this? I don't know the answers."
 
I don't really have anything of substance to add. I just want to ask if anyone is suprised? Is anyone but me flippin terrified of .gov?

My last question is why is everybody so concerned about the Constitution? It's just a piece of paper right?
 
A peice of paper I'll defend with my every part of my being. But on the internet defilement from the FBI....George Orwell was right...on the money.
 
Interception typically takes place inside an Internet provider's network at the junction point of a router or network switch.
If they're doing it, they're doing it higher up than the ISP and probably on the tier 1 provider networks. The only instance I'm aware of for this happening with any of the local ISP's is for a limited period of time relating to a child pornography. Now tier 1's like att have been known to give the reign full access to their network and I'd never know if all of the traffic of my isp was being allowed to be eavesdropped on by my upstream provider.
 
I wonder if the new bunch at .gov know what a postcard is. :D
I bet we could really baffle .gov with a postcard that has a stamp in it. :uhoh:

Just remember boys and girls, the idea of Internet was for .gov [military] to have communication in the event matters got real serious and needed to communicate Military needs.

It took the Private Sector [Colleges , Scientific , Business community ]to get this Internet to work.

So while one is well advised to not post anything publicly on the 'Net, and take prudent steps to protect themselves while on the 'Net - I am not too sure .gov really knows what is going on.

"Hey Joe, what is this thing about 3X5" with paper thing stuck up in the upper right corner, with a picture of it looks like a picture?"
My guess whistle-britches in .gov will finally ask his grandpa and be told it is a postcard with a stamp on it , with a setting of a tourist spot.

Remember the Fido-Net....;)
 
Link please?

With various bureaucrats pushing to kill net Neutrality & Internet 2 (as well as several internet censorship bills) this is not surprising in the least.
 
i'm truly shocked! You mean it wasn't Algore?

No Virginia, although Algore played a big part in getting funding for the the Private Sector. According to Vincent Cerf, a senior vice president with MCI Worldcom who's been called the Father of the Internet, "The Internet would not be where it is in the United States without the strong support given to it and related research areas by the Vice President in his current role and in his earlier role as Senator."

The inventor of the Mosaic Browser, Marc Andreesen, credits Gore with making his work possible. He received a federal grant through Gore's High Performance Computing Act. The University of Pennsylvania's Dave Ferber says that without Gore the Internet "would not be where it is today."

Joseph E. Traub, a computer science professor at Columbia University, claims that Gore "was perhaps the first political leader to grasp the importance of networking the country. Could we perhaps see an end to cheap shots from politicians and pundits about inventing the Internet?"

Now look what the .gov has done with it under an elephant flag. :cuss:
 
It seems like everyday I gain a better understanding of why the founding fathers put some of the amendements in the Bill of Rights.
 
Aw, c'mon

It's not that bad.

You just KNOW there's someone in all that bandwidth breaking the law!

There HAS to be!

'Course, if we find out there's not, we'll just have to adjust the law.
 
Heh, the NSA is offering me a good long distance calling plan. Very cheap, with unlimited calling to the Middle East.

I guess this is bad, but it's not anything that's too surprising. The only thing you really CAN do is just ignore it. Someone once said "You live in fear, I'll live in America." I guess it's just your perception things. I do not like this at all, but at the same time, there's NOTHING I or anyone can do about it.

There's more issues I guess, but to stop this, we cant as gunowners or Americans, be rational and calm. They're using our rational "oh, let's call my congressman LOL" attitude against us. They know how rational and calm we are, and they're using it against us, because we're too rational and calm to fight back.

Really, what if the Founding Fathers were like "hey the tax on tea isnt THAT bad, let's go keep writing letters."?
 
Status
Not open for further replies.
Back
Top