ppt

advertisement
“Technology Solutions”
Full-Pipe Surveillance
EDUCAUSE CSG - Blacksburg
January 9, 2008
Lee Smith, Attorney
King George And The Colonies
“writs of assistance”
• In the colonies, smuggling rather than
seditious libel afforded the leading
examples of the necessity for protection
against unreasonable searches and
seizures. In order to enforce the revenue
laws, English authorities made use of
writs of assistance, which were general
warrants authorizing the bearer to enter
any house or other place to search for
and seize ''prohibited and uncustomed''
goods, and commanding all subjects to
assist in these endeavors.
U.S. Constitution
Fourth Amendment
• The right of the people to be secure
in their persons, houses, papers, and
effects, against unreasonable
searches and seizures, shall not be
violated, and no Warrants shall
issue, but upon probable cause,
supported by Oath or affirmation,
and particularly describing the place
to be searched, and the persons or
things to be seized.
Electronic Surveillance
• The US Supreme Court in US v. Katz, 389 US 347 (1967) extended
the Fourth Amendment protection from unreasonable searches and
seizures to protect individuals in a telephone booth from wiretaps by
authorities without a warrant (device attached to outside wall)
• So long as an individual can justifiably expect that his conversation
would remain private, his/her conversation is protected from
"unreasonable search and seizure" by the Fourth Amendment.
• The Fourth Amendment protects people, not just places. Therefore,
the rights of an individual may not be violated, regardless of whether
or not there is physical intrusion into any given area.
• A warrant is required before the government can execute a wiretap,
and the warrant must be sufficiently limited in scope and duration.
Statutes
• Title III and ECPA. Title III and the Electronic
Commnunications Privacy Act make up the statutes that
govern criminal wiretaps in the United States.
• FISA. The Foreign Intelligence Surveillance Act is the
law that governs eavesdropping on agents of "foreign
powers" within the United States, including suspected
foreign terrorists.
Searches Without Warrants
•
•
•
•
•
•
Probable Cause
Exigent Circumstances
Special Needs – US v. Heckenkamp
Terry v. Ohio Detention: Stop-and-Frisk
Incident to Arrest
“Plain View”
• Consent Searches
“Special Needs”
Warrentless Search
• Jerome Heckenkamp (AKA the “eBay Hacker”),
a University of Wisconsin student was convicted
of federal computer crime charges for defacing
eBay by hacking into Qualcomm, Cygnus
Solutions and other companies.
• Heckenkamp was caught after a University
system administrator hacked into his Linux box
to gather evidence that Heckenkamp had been
attacking the college mail server.
• The 9th Circuit ruled that such counter-hacks are
allowable under the 'special needs' exception to
the Fourth Amendment, and upheld the
warrantless search.
UNITED STATES OF AMERICA, Plaintiff-Appellee, v. JEROME T. HECKENKAMP,
Defendant-Appellant.
No. 05-10322, No. 05-10323
UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT
2007 U.S. App. LEXIS 7806
August 17, 2006, Argued and Submitted, San Francisco, California
April 5, 2007, Filed
• “Although we conclude that Heckenkamp had a reasonable
expectation of privacy in his personal computer, we conclude
that the search of the computer was justified under the "special
needs" exception to the warrant requirement. Under the special
needs exception, a warrant is not required when "'special
needs, beyond the normal need for law enforcement, make the
warrant and probable-cause requirement impracticable.'"
PATRIOT Act
Warrantless Search
• The National Security Letter (NSL)
provision of the PATRIOT Act allows
the FBI to secretly demand access to
records held by organizations like
universities and Internet service
providers without probable cause or
judicial oversight
PATRIOT Act
National Security Letter (NSL) Provision
18 U.S.C. §2709
•
Such letters are not new. Before the Patriot Act was enacted a few weeks
after the September 11, 2001, terrorist attacks, NSLs could be used in
investigations of suspected terrorists and spies.
•
NSLs to telecommunications firms originated with a 1986 law called the
Electronic Communications Privacy Act, which permitted them only in
relation to an investigation of "an agent of a foreign power." That once-strict
requirement was broadened in 1993 and again by the Patriot Act eight years
later.
•
After the Patriot Act change to the law, the FBI needed only to say that a
letter may be "relevant" to a terrorist-related investigation.
•
NSLs do not require any prior review or court approval.
•
NSLs impose a "gag" restriction forbidding a recipient from disclosing that
they have received the letter.
Here We Come...
CALEA... Or Not!
• When the FBI has a court order but an Internet service provider can't
isolate the particular person or IP address because of “technical
constraints”, it takes and records all the ISP information
• “Full-pipe” surveillance can record all Internet traffic or, optionally,
only certain subsets, flowing through the network.
• Interception typically takes place inside an Internet provider's
network at the junction point of a router or network switch.
• It then searches through the data, while at the same time gathering
lots of other information on people who just happen to be the same
customer as the target.
• “You intercept first and you use whatever filtering, data mining to get
at the information about the person you're trying to monitor”.
Illustration By Dustin Ingalls
Download