1/20/02Miller CSC3091 Ch3a Wiretapping. 1/20/02Miller CSC3092 Tap Or Not to Tap Advances in technology are rapidly making traditional wiretaps obsolete.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Fiducianet, inc. tm 1 Presented by H. Michael Warren, President fiducianet, inc. VoIP Technology Perspectives Law Enforcement Concerns & CALEA Compliance.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
The Federal Court System
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
Federal Bureau of Investigation
The Patriot Act Protecting the US or Violating People’s Freedoms.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The Federal Court System …and Justice For All. The Adversarial System Courts settle civil disputes between private parties, a private party and the government,
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Communications Assistance for Law Enforcement Act & Higher Education: or How I Learned to Stop Worrying and Love Wiretaps Terry Hartle American Council.
The USA PATRIOT Act An Overstatement of ALA Concerns?
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 ADMINISTRATIVE LAW AND REGULATORY AGENCIES © 2010 Pearson Education, Inc., publishing as.
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Chapter 18 - The Fourth Amendment and National Security.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
John Morris 1 Hot Topic - IP Services Wiretapping the Internet EDUCAUSE Policy Conference May 20, 2004 John Morris, Center for Democracy and Technology.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
“Congress lets the NSA run Amok” Jeffrey Rosen. Congress, NSA and President: Congress, NSA and President: Let Courts Deal with It Two NSA programs: 1)
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Domestic Surveillance By: Joshua Hedden. What is Domestic Surveillance? A legal investigative process entailing a close observing or listening to a person.
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
Network Neutrality: An Internet operating principle which ensures that all online users are entitled to access Internet content of their choice; run online.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Unit 2: Chapter 17.  Attacks on September 11, 2001 shook America to its core  Largest on U.S. soil since World War II  Feeling of vulnerability  Congress.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Surveillance around the world
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Evolutionary Powers of the Presidency Not mentioned in the Constitution… 1.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
How Does Electronic Surveillance Work Legally?
Laws Governing Police Surveillance
Electronic Surveillance, Post 9/11
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The Right to Privacy vs. National Security
Presentation transcript:

1/20/02Miller CSC3091 Ch3a Wiretapping

1/20/02Miller CSC3092 Tap Or Not to Tap Advances in technology are rapidly making traditional wiretaps obsolete. FBI interested in maintaining the ability to wiretap granted by law by requiring that wiretap capabilities be built into new systems. Concerns raised about competitiveness, privacy, and technological abuse.

1/20/02Miller CSC3093 Wiretapping Long controversy here. When there were phone operators making all the connections and party lines there were lots of privacy questions raised. Wiretapping was widely used by law- enforcement agencies, businesses, private detectives, political candidates, and others. In 1928 the Supreme Court ruled that it was not unconstitutional but could be banned by Congress.

10/4/08Miller CSC3094 Wiretapping (Cont.) In 1934 Congress passed the Federal Communications Act that prohibited any person not authorized by the sender from intercepting and divulging a message. No exception was made for law enforcement who kept on wiretapping.

10/4/08Miller CSC3095 Wiretapping (Cont.) The first legal wiretapping and electronic surveillance by law enforcement (court order needed) was approved by congress in 1968.

1/20/02Miller CSC3096 Wiretapping (Cont.) In order to obtain permission to wire tap law enforcement needed to demonstrate probable cause that the subject under investigation is committing some specific, serious, felony and communications concerning the offense will be obtained through the intercepts.

1/20/02Miller CSC3097 Wiretapping (Cont.) Before issuing a court order, a judge must review a lengthy affidavit that sets forth all the evidence and agree with the assertions contained there in. The affidavit must also demonstrate that other investigative techniques have been tried without success, or won't work, or would be too dangerous.

1/20/02Miller CSC3098 Wiretapping (Cont.) The Electronic Communications Privacy Act of 1986 extended 1968 wire tapping regulations to electronic communication including fax transmissions, , cordless and cellular phones, and paging devices.

2/6/03Miller CSC3099 What’s Different? The stakes are now higher in that when someone does a wiretap they have access to all of the account numbers, Pin's, and passwords we enter when we conduct business transactions. The flip side is that call forwarding, the switch to digital from analog, etc. make wiretaps more difficult to do and many of the techniques that worked with analog signals simply do not work.

1/20/02Miller CSC30910 Digital Telephony Legislation Law enforcement agencies have reported technical difficulties in doing taps when technologies such as fiber optic transmissions are used. So the government proposed in September of 1992 digital telephony legislation "to ensure law enforcement's continued ability to conduct court-authorized taps." A version (CALEA) was passed in 1994.

2/9/09Miller CSC30911 CALEA The Communications Assistance for Law Enforcement Act of 1994 required telephone companies to rewire their networks and switches to guarantee ready eavesdropping access to law enforcement. This was supposed to preserve law enforcement surveillance capabilities in the face of technological change. What the FBI really wanted was assurance that they could tap any new technology so they wanted to have the final say on the development and deployment of any related new technology.

1/20/02Miller CSC30912 CALEA The communication industry and privacy groups fought expanding the FBI’s power. Congress agreed and established minimum functional requirements intended to preserve but not expand law enforcement access to communications, and deferred to industry to develop implementing solutions. Congress also made $500,000,000 available to fund the activity.

2/9/09Miller CSC30913 Limits on CALEA A House of Representatives committee report prepared in October 1994 says CALEA's requirements "do not apply to information services such as electronic-mail services; or online services such as CompuServe, Prodigy, America Online or Mead Data; or to Internet service providers."

1/20/02Miller CSC30914 CALEA/FCC Aug 1999 Decision The Federal Communications Commission has ordered the nation's phone companies to modify their systems to provide the FBI with added surveillance capabilities. The FCC ruled in favor of the government on virtually all issues of privacy concern, including ruling that wireless phone companies must be able to provide the cell site of their customers at the beginning and end of every call, effectively turning cell phones into tracking devices.

1/20/02Miller CSC30915 CALEA/FCC Aug 1999 Decision On packet mode communications, the Commission declined the request that carriers be required to protect the privacy of packet communications that the government is not authorized to intercept. Instead, the Commission asked the industry for more information on the rapidly looming question of surveillance of packet networks. August 27, 1999.

1/20/02Miller CSC30916 CALEA/FCC Aug 1999 Decision Partially Rejected In August of 2000 an Appeals Court upheld the cell phone tracking requirement but not the FCC's decision ordering carriers to provide added call dialing and signaling information sought by the FBI. The court, also ruled that a full, probable cause-based Title III wiretap order was needed to obtain packets from which content has not been stripped. This raises doubts about the legality of the FBI's Carnivore.

1/20/02Miller CSC Wiretapping Statistics 1,350 requests approved No request denied 1,921 conversations intercepted per wiretap 195 people intercepted per wiretap $57,511 per wiretap 28.8% of intercepted conversations deemed “incriminating”

1/20/02Miller CSC30918 Wiretapping Statistics Requests for a wiretap order are almost always approved : 10,849 applications approved : 2 applications denied

9/28/08Miller CSC30919 The United States Foreign Intelligence Surveillance Court FISC is a U.S. Federal court established by the Foreign Intelligence Surveillance Act (FISA) of The FISC oversees requests for surveillance warrants against suspected foreign intelligence agents inside the United States by federal police agencies (primarily the F.B.I.)

9/28/08Miller CSC30920 FISC Statistics Requests for a FISA warrant (wiretap order): Through the end of 2004, 18,761 warrants were granted, while at most five were rejected. Fewer than 200 requests had to be modified before being accepted. The four known rejected requests were all partially granted after being resubmitted for reconsideration by the government. Wikipedia

2/9/09Miller CSC30921 By The Rules? May, 2002, the FISC rebuffed then-Attorney General John Ashcroft, releasing an opinion that alleged that FBI and Justice Department officials had "supplied erroneous information to the court in more than 75 applications for search warrants and wiretaps, including one signed by then-FBI Director Louis J. Freeh". On December, 2005, the New York Times reported that the Bush administration had been conducting surveillance against U.S. citizens without the knowledge of the FISC since Wikipedia

1/17/09Miller CSC30922 In Practice Courts throw out evidence obtained in illegal wiretaps. Tend to authorize taps when some other method has been tried and failed (not all other methods). Do not enforce the minimization requirements of the law which requires that agents screen calls and turn off recording devices whenever the conversation appears to be irrelevant to the purpose of the tap.

1/20/02Miller CSC30923 Pen Register/Trap and Trace Pen registers are surveillance devices that capture the phone numbers dialed on outgoing telephone calls; trap and trace devices capture the numbers identifying incoming calls. They are not supposed to reveal the content of communications. They are not even supposed to identify the parties to a communication or whether a call was connected, only that one phone dialed another phone.

1/20/02Miller CSC30924 Pen Register/Trap and Trace These devices were not covered in either the Federal Communications act of 1934 or the Crime Act of Current law requires the Judge to issue approval for the use of pen register or trap and trace orders whenever the government certifies that the information to be gathered is “relevant” to an ongoing criminal investigation. Every request has been approved. September 11, 2001, triggered a push to extend legislation to cover Internet.

1/20/02Miller CSC30925 Pen Register and Trap and Trace Device Usage Statistics In 1996 U.S. Department of Justice law enforcement agencies obtained 4569 pen register or trap and trace orders covering the telephone facilities of 10,520 individuals. The figures for 1995 were 4972 orders covering 11,801 people. These figures do not include other federal law enforcement agencies or state and local police.

1/20/02Miller CSC30926 Transactional Data With a a subpoena law enforcement can gain access to stored transactional data related to local or long distance calls. (No court order required in foreign counterintelligence or international terrorism cases) Real-time tracking information generated in wireless systems is a new type of transactional data.

2/9/09Miller CSC /23/05 FCC The Federal Communications Commission (FCC) has issued a 59 page set rules designed to make it easier for police to seek wiretaps. Broadband providers and internet phone services have until spring 2007 to comply. Any provider linking with the public telephone network must be wiretap-ready. What remains uncertain is what this CALEA ruling means for companies, universities, not-for-profit organizations, or individuals offering internet access.

2/9/09Miller CSC /05 New federal wiretapping rules forcing Internet service providers and universities to rewire their networks for FBI surveillance of and Web browsing are being challenged in court. Telecommunications firms, nonprofit organizations and educators are asking the U.S. Court of Appeals to overturn the new rules that extend the sweep of an 11-year-old surveillance law designed to guarantee police the ability to eavesdrop on telephone calls.

2/9/09Miller CSC30929 Appeal 6/9/06 Bush administration's plans to force Internet providers to comply with extensive wiretapping rules received a boost on Friday, when a three- judge panel of the U.S. Court of Appeals in Washington, D.C., refused to overturn the Internet surveillance regulations, saying the Federal Communications Commission made a "reasonable policy choice”.

2/9/09Miller CSC30930 Congress to Rewrite Rules on Wiretapping June 20, 2008 A deal has been reached to overhaul the rules on the government’s wire- tapping powers and provide what amounts to legal immunity to the phone companies that took part in President Bush’s warrantless eavesdropping program after the Sept. 11 attacks.

2/9/09Miller CSC30931 Congress to Rewrite Rules on Wiretapping The deal, expanding the government’s powers in some key respects, would allow intelligence officials to use broad warrants to eavesdrop on foreign targets and conduct emergency wiretaps without court orders on American targets for a week if it is determined important national security information would be lost otherwise.

2/9/09Miller CSC30932

1/20/02Miller CSC30933 Normal vs. Electronic Search With a search warrant there is a knock and notify requirement (So that the owner can observe the process to assure that his rights are not violated [not to give time to flush the drugs]) and if nothing is found they need to go back in get a second search warrant before doing it again. No notification with electronic and it can go on for years without seeking additional approval.