After the prosecution of a California doctor revealed the FBI’s ties to a Best Buy Geek Squad computer repair facility in Kentucky, new documents released to EFF show that the relationship goes back years. The records also confirm that the FBI has paid Geek Squad employees as informants.
Federal investigators’ use of Stingrays to hunt for an undocumented immigration marks “the latest sign of mission creep in domestic deployment of battlefield-strength surveillance technology,” said EFF’s Adam Schwartz. (Photo: Håkan Dahlström/flickr/cc)
As the Trump administration and Congressional Republicans continue to push for a harsher immigration crackdown, new reporting reveals that FBI and Immigration and Customs Enforcement (ICE) agents employed a controversial surveillance technology known as Stingrays to hunt down undocumented immigrants.
According to Electronic Frontier Foundation’s Adam Schwartz, the The Detroit News report, based on a federal search warrant affidavit, marks “the latest sign of mission creep in domestic deployment of battlefield-strength surveillance technology.” Continue reading →
Former Acting Attorney General Sally Yates has been invited to testify publicly before Congress on the investigation into alleged Russian election meddling.
The hearing is expected to take place after May 2. Former CIA director John Brennan and former director of national intelligence James Clapper are also scheduled to testify.
Yates was originally set to appear before the House Intelligence Committee in March, but the hearing was canceled by then-lead investigator Rep. Devin Nunes (R-Calif.), who has since stepped down amid accusations of ethics violations. Continue reading →
Washington, D.C. — In a case that’s drawn criticism from multiple angles, last week federal prosecutors in Washington state dropped all charges against a man who allegedly downloaded child pornography from a website that was infiltrated, taken over, and allegedly even improved by the FBI.
The site, Playpen, operated on a platform designed to mask the real identities of its users, as Gizmodo explained Monday:
“The site in question operated on the Tor network, a system used to anonymize web activity. The network makes use of a special web browser that conceals people’s identities and location by routing their internet connections through a complex series of computers and encrypting data in the process.”Continue reading →
Dust off your fax machine. The FBI is planning to take a big step backward for government transparency.
As of March 1, the Bureau will no longer accept Freedom of Information Act (FOIA) requests via email. Anyone seeking public records from the FBI will have to use a new online portal — or send requests via fax or snail mail.
Online FOIA portals may seem like a good idea in theory, but government agencies make them difficult to use — with way too many burdensome requirements.
Tom Hayden at the LBJ Library 2016. Photo: Godwin [Public domain], via Wikimedia Commons
Progressive icon and anti-war activist turned California lawmaker Tom Hayden passed on Sunday at the age of 76.
Hayden dedicated his life to peace, social justice, and activism: from the 1960s, when he helped found the New Left and worked to organize black southern sharecroppers, to building—alongside his former wife, actress Jane Fonda—a California political machine that for decades advanced progressive candidates and measures. Continue reading →
Fear of hackers reading private emails in cloud-based systems like Microsoft Outlook, Gmail or Yahoo has recently sent regular people and public officials scrambling to delete entire accounts full of messages dating back years. What we don’t expect is our own government to hack our email – but it’s happening. Federal court cases going on right now are revealing that federal officials can read all your email without your knowledge.
The federal government is getting access to the contents of entire email accounts by using an ancient procedure – the search warrant – with a new, sinister twist: secret court proceedings.
The earliest search warrants had a very limited purpose – authorizing entry to private premises to find and recover stolen goods. During the era of the American Revolution, British authorities abused this power to conduct dragnet searches of colonial homes and to seize people’s private papers looking for evidence of political resistance.
To prevent the new federal government from engaging in that sort of tyranny, special controls over search warrants were written into the Fourth Amendment to the Constitution. But these constitutional provisions are failing to protect our personal documents if they are stored in the cloud or on our smartphones.
Fortunately, the government’s efforts are finally being made public, thanks to legal battles taken up by Apple, Microsoft and other major companies. But the feds are fighting back, using even more subversive legal tactics.
Searching in secret
To get these warrants in the first place, the feds are using the Electronic Communications Privacy Act, passed in 1986 – long before widespread use of cloud-based email and smartphones. That law allows the government to use a warrant to get electronic communications from the company providing the service – rather than the true owner of the email account, the person who uses it.
But relatively little notice has come to a similar Microsoft effort on behalf of customers that began in April 2016. The company’s suit argued that search warrants delivered to Microsoft for customers’ emails are violating regular people’s constitutional rights. (It also argued that being gagged violates Microsoft’s own First Amendment rights.)
It’s very difficult to get a copy of one of these search warrants, thanks to orders sealing files and gagging companies. But in another Microsoft lawsuit against the government a redacted warrant was made part of the court record. It shows how the government asks for – and receives – the power to look at all of a person’s email.
On the first page of the warrant, the cloud-based email account is clearly treated as “premises” controlled by Microsoft, not by the email account’s owner:
“An application by a federal law enforcement officer or an attorney for the government requests the search of the following … property located in the Western District of Washington, the premises known and described as the email account [REDACTED]@MSN.COM, which is controlled by Microsoft Corporation.”
The Fourth Amendment requires that a search warrant must “particularly describe the things to be seized” and there must be “probable cause” based on sworn testimony that those particular things are evidence of a crime. But this warrant orders Microsoft to turn over “the contents of all e-mails stored in the account, including copies of e-mails sent from the account.” From the day the account was opened to the date of the warrant, everything must be handed over to the feds.
Reading all of it
In warrants like this, the government is deliberately not limiting itself to the constitutionally required “particular description” of the messages it’s looking for. To get away with this, it tells judges that incriminating emails can be hard to find – maybe even hidden with misleading names, dates and file attachments – so their computer forensic experts need access to the whole data base to work their magic.
If the government were serious about obeying the Constitution, when it asks for an entire email account, at least it would write into the warrant limits on its forensic analysis so only emails that are evidence of a crime could be viewed. But this Microsoft warrant says an unspecified “variety of techniques may be employed to search the seized emails,“ including “email by email review.”
If Microsoft wins, then citizens will have the chance to see these search warrants and challenge the ways they violate the Constitution. But the government has come up with a clever – and sinister – argument for throwing the case out of court before it even gets started.
The government has asked the judge in the case to rule that Microsoft has no legal right to raise the Constitutional rights of its customers. Anticipating this move, the American Civil Liberties Union asked to join the lawsuit, saying it uses Outlook and wants notice if Microsoft were served with a warrant for its email.
The government’s response? The ACLU has no right to sue because it can’t prove that there has been or will be a search warrant for its email. Of course the point of the lawsuit is to protect citizens who can’t prove they are subject to a search warrant because of the secrecy of the whole process. The government’s position is that no one in America has the legal right to challenge the way prosecutors are using this law.
Far from the only risk
The government is taking a similar approch to smartphone data.
Where does this all leave us now? The judge in Ravelo is expected to issue a preliminary ruling on the feds’ arguments sometime in October. The government will be filing a final brief on its motion to dismiss the Microsoft case September 23. All Americans should be watching carefully to what happens next in these cases – the government may be already watching you without your knowledge.
Leaked document shows the FBI does not have to jump through a lot of hoops to get access to journalists’ call data. (Photo: Roger H. Goun/flickr/cc)
Newly leaked documents published by The Intercept expose just how easy it is for the FBI to spy on journalists using so-called National Security Letters (NSLs).
The classified rules, which had previously been released only in heavily redacted form, “show that the FBI imposes few constraints on itself when it bypasses the requirement to go to court and obtain subpoenas or search warrants before accessing journalists’ information,” The Intercept‘s Cora Currier wrote on Thursday. Continue reading →
The rule would allow a federal judge to issue a warrant for any target using anonymity software like Tor to browse the internet. (Photo: Ben Watkin/flickr/cc)
The U.S. Supreme Court on Thursday quietly approved a rule change that would allow a federal magistrate judge to issue a search and seizure warrant for any target using anonymity software like Tor to browse the internet.
Absent action by U.S. Congress, the rule change (pdf) will go into effect in December. The FBI would then be able to search computers remotely—even if the bureau doesn’t know where that computer is located—if a user has anonymity software installed on it. Continue reading →
What is privacy and what is an individual’s right to it?
That is the question that renowned linguist and MIT professor Noam Chomsky, National Security Agency (NSA) whistleblower Edward Snowden, and Intercept co-founding editor Glenn Greenwald sought to answer on Friday evening as the three (virtually) shared a stage for a panel discussion at the University of Arizona in Tuscon.
Coming amid the FBI’s public battle against Apple as well as days after the bombings in Brussels last week, which have spurred another round of calls for heightened security and surveillance, the conversation challenged the rhetoric that national security requires that governments can access individual communications. Continue reading →