SlideShare uma empresa Scribd logo
1 de 3
WARRANTLESS GOVERNMENTAL SURVEILLANCE THROUGH THE USE OF EMERGING
TECHNOLOGY HAS BECOME A MAINSTAY OF GOVERNMENTAL INVESTIGATION
BY VANIA M. CHAKER, ESQ.
The United States government enjoys awesome technological capabilities.1
It can
facilely monitor electronic communications and surreptitiously retrieve stored information on
private computer systems. Technology that was once the stuff of science fiction is now routinely
used in real life to monitor the activities of citizens, corporations, even foreign nationals in
foreign nations.2
Telephone conversations, text messages, electronic transmissions, and even
corporate network traffic have been subject to surreptitious warrantless government surveillance
by executive order under the mandate of heightened national security concerns in the “Post-9/11
Era.”3
Moreover, in addition to the fully-stocked arsenal of highly-advanced equipment and
sophisticated technology the government enjoys, it can also rely upon lofty justifications such as
“national security” and “the public good” to persuade or issue seemingly-reasonable directives to
large private companies, such as the behemoth firms of AT&T, Verizon, and Bell South, to assist
the government with warrantless investigations of private citizens and entities.4
1
For example, the “Warrantless Surveillance Controversy” by the U.S. National Security Agency (“NSA”) involved
the surveillance of individuals on domestic soil and only incident to Post-9/11 foreign intelligence investigations
by the NSA. This directive, termed the “Terrorist Surveillance Program” by the George W. Bush administration,
was a component of the broader “President's Surveillance Program” which the NSA is authorized by executive
order to monitor the communications of private citizens and companies without a warrant. Phone calls, e-mails,
internet activity, text messaging, and other communications involving one party that the NSA may believe to be
outside the United States were subject to warrantless government surveillance even if the other party was located
on domestic soil. Widespread claims, however, indicate that such warrantless surveillance was conducted with
respect to purely domestic communications. Due to the highly sensitive nature of the program, its exact scope is
not known, but it is reported that the NSA had broad, unsupervised access to all fiber-optic communications of
many of the major telecommunication companies’ communications and telephony traffic.
2
The National Security Agency (“NSA”) is charged with spying on and investigating foreign communications as
part of its governmental directive.
3
It has also been reported that such programs operated without the judicial oversight that was mandated by Foreign
Intelligence Surveillance Act (“FISA”).
4
The case of Hepting v. AT&T (06-CV-01791-VRW) (2006) uncovered the widespread assistance of several large
telecommunications companies (in addition to AT&T) which were illegally collaborating with the National
Security Agency to unlawfully spy on private citizens and companies. These companies were unlawfully
monitoring the communications of the United States, including AT&T customers, businesses and third parties
whose communications were routed through AT&T's network, as well as Voice over IP telephone calls routed via
the internet. Unfortunately, much of the details could not be learned since the government resisted efforts to
learn about the scope of the operation and since discovery could not be completed because District Court Judge
Vaughn Walker dismissed the case in 2006 after the government provided retroactive immunity for any
telecommunications companies illegally assisting the government thereby rendering the lawsuit moot.
2
The Federal Bureau of Investigation (“FBI”) routinely uses computer programs such as
Magic Lantern,5
a secretly-installed key logger software, to spy on every keystroke made on a
target’s computer – even if the communications occur inside the sanctity of one’s home.6
Another highly intrusive FBI software program, the Computer and Internet Protocol Address
Verifier (“CIPAV”),7
is a data gathering software program that can track every email sent, every
internet site visited, every software application installed by an individual or private company. It
can also track the location of a computer through its IP address. Other government programs
about which the public has extremely limited information include ESCHELON, “Cyber
Knight,” and Carnivore,8,9
and other FBI-developed software programs used to monitor
electronic communications.
The government uses additional surreptitious data collection techniques and devices to
warrantlessly investigate targets. The government may also, for example, remotely install a
“Trojan Horse” virus, “rootkit” virus, or other sorts of spyware onto a target’s computer system.
Doing so could allow an outsider to control an individual’s computer system remotely, monitor
computer usage and transmissions, and remotely control a computer camera to spy on private
activities.10
Other United States agencies, such as the National Security Agency, 11
continue to
5
Magic Lantern, a key logger software program developed by the Federal Bureau of Investigation, was first
reported to be in existence on November 21, 2001.
6
The FBI's use of key logging software is discussed in the case of United States v. Scarfo, 180 F.Supp.2d 572
(D.N.J. 2001). See infra.
7
“Computer spy programs such as “CIPAV,” a software data gathering tool that the Federal Bureau of
Investigation uses to track and gather location data on suspects who are under electronic surveillance. CIPAV
captures location-related information of a computer, such as its IP address, MAC address, the programs which
have been downloaded onto the computer, programs which are running on the program, the type of operating
system, the installed application registration and version information, the default web browser, the URL of the
last visited website. CIPAV silently monitors all outbound communication, logs every IP address to which the
computer connects, and time stamps each internet encounter from that computer.” Wikipedia CIPAV page –
http://en.wikipedia.org/wiki/Magic_Lantern_(software).
8
See http://en.wikipedia.org/wiki/Carnivore_(FBI).
9
http://email.about.com/od/staysecureandprivate/a/carnivore.htm
10
See, e.g., Selena Larson, 2017 Year in Review: The Hacks that Left Us Exposed in 2017, CNN Tech (December
20, 2017: 9:11 AM ET), http://money.cnn.com/2017/12/18/technology/biggest-cyberattacks-of-the-
year/index.html.
11
For example, the National Security Agency routinely eavesdrops on all conversations, which was the tactic used
to locate Osama Bin Laden. A NOVA documentary examined the high-tech eavesdropping carried out by the
NSA. See “The Spy Factory – Examine the. Aired February 3, 2009 on PBS.”
3
develop additional tools with which to monitor citizens and private companies,12
such as
cookies,13
web bugs,14
surreptitiously-installed spyware,15
and Radio Frequency Identification
(“RFID”) tags.16
Unfortunately, such powerful governmental capabilities have not been tempered by the
countervailing protective judicial or legislative safeguards necessary to offset the greatly
increased potential for improper government intrusiveness.
BY VANIA M. CHAKER, ESQ.
VANIA CHAKER AT COLUMBIA SOCAL
HTTPS://PLUS.GOOGLE.COM/114362351614525708773
WWW.VANIACHAKER.COM
HTTPS://CASETEXT.COM/USERS/VANIA-CHAKER
VANIA CHAKER
VANIA CHAKER (@VMCHAKER) | TWITTER
WWW.VANIACHAKERBLOG.WORDPRESS.COM
HTTPS://WWW.LINKEDIN.COM/IN/VANIACHAKER/
VANIA CHAKER
HTTPS://TWITTER.COM/VANIA_CHAKER
VANIACHAKER@GMAIL.COM
http://www.pbs.org/wgbh/nova/military/spy-factory.html.
12
Other programs also existed such as “COINTELPRO” (an acronym for Counter Intelligence Program) which
was reported to have been a series of covert measures instituted by the FBI focused at investigating citizens and
organizations within the United States during the Nixon administration.
13
A cookie has been defined as: “cookie (also tracking cookie, browser cookie, and HTTP cookie) is a small piece
of text stored on a user's computer by a web browser. A cookie consists of one or more name-value pairs
containing bits of information such as user preferences, shopping cart contents, the identifier for a server-based
session, or other data used by websites.” http://en.wikipedia.org/wiki/HTTP_cookie. See also “magic cookie.”
14
Web bug has been defined as “an object that is embedded in a web page or e-mail and is usually invisible to the
user but allows checking that a user has viewed the page or e-mail. One common use is in e-mail tracking.
Alternative names are Web beacon, tracking bug, tracking pixel, pixel tag, 1×1 gif, and clear gif.”
http://en.wikipedia.org/wiki/Web_bug
15
Spyware has been defined and discussed as follows: “as a type of malware that is installed on computers and
collects information about users without their knowledge. The presence of spyware is typically hidden from the
user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares
such as key loggers are installed by the owner of a shared, corporate, or public computer on purpose in order to
secretly monitor other users. While the term spyware suggests software that secretly monitors the user's
computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect
various types of personal information, such as Internet surfing habits and sites that have been visited, but can
also interfere with user control of the computer in other ways, such as installing additional software and
redirecting Web browser activity.” http://en.wikipedia.org/wiki/Spyware
16
Radio-frequency identification (RFID) has been defined as “the use of an object (typically referred to as an RFID
tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking
using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader.”

Mais conteúdo relacionado

Mais procurados

Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreInMobi Technology
 
20150604 nyt-cyber-surveillance-documents
20150604 nyt-cyber-surveillance-documents20150604 nyt-cyber-surveillance-documents
20150604 nyt-cyber-surveillance-documentsAnonDownload
 
Dba forbidden-knowledge-stingray-july-2014
Dba forbidden-knowledge-stingray-july-2014Dba forbidden-knowledge-stingray-july-2014
Dba forbidden-knowledge-stingray-july-2014DeepDude
 
Paranoia or risk management 2013
Paranoia or risk management 2013Paranoia or risk management 2013
Paranoia or risk management 2013Henrik Kramshøj
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationstrupassion
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 

Mais procurados (20)

Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Oni Iran 2009
Oni Iran 2009Oni Iran 2009
Oni Iran 2009
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
 
Pegasus, A spyware
Pegasus, A spywarePegasus, A spyware
Pegasus, A spyware
 
20150604 nyt-cyber-surveillance-documents
20150604 nyt-cyber-surveillance-documents20150604 nyt-cyber-surveillance-documents
20150604 nyt-cyber-surveillance-documents
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Dba forbidden-knowledge-stingray-july-2014
Dba forbidden-knowledge-stingray-july-2014Dba forbidden-knowledge-stingray-july-2014
Dba forbidden-knowledge-stingray-july-2014
 
Tagged!
Tagged!Tagged!
Tagged!
 
Paranoia or risk management 2013
Paranoia or risk management 2013Paranoia or risk management 2013
Paranoia or risk management 2013
 
Q&A about PRISM
Q&A about PRISMQ&A about PRISM
Q&A about PRISM
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Tor talk-prosa-screen
Tor talk-prosa-screenTor talk-prosa-screen
Tor talk-prosa-screen
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelations
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 

Semelhante a Government Surveillance Through Emerging Tech

How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center- Mark - Fullbright
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
The Security Implications of Foreign Hardware & Software February 2019
The Security Implications of Foreign Hardware & Software  February 2019The Security Implications of Foreign Hardware & Software  February 2019
The Security Implications of Foreign Hardware & Software February 2019ChadCogan
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docxAmir Khan
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 

Semelhante a Government Surveillance Through Emerging Tech (20)

How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
China Cyber
China CyberChina Cyber
China Cyber
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
The Security Implications of Foreign Hardware & Software February 2019
The Security Implications of Foreign Hardware & Software  February 2019The Security Implications of Foreign Hardware & Software  February 2019
The Security Implications of Foreign Hardware & Software February 2019
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Internet in news
Internet in newsInternet in news
Internet in news
 

Último

Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
 

Último (20)

Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
 

Government Surveillance Through Emerging Tech

  • 1. WARRANTLESS GOVERNMENTAL SURVEILLANCE THROUGH THE USE OF EMERGING TECHNOLOGY HAS BECOME A MAINSTAY OF GOVERNMENTAL INVESTIGATION BY VANIA M. CHAKER, ESQ. The United States government enjoys awesome technological capabilities.1 It can facilely monitor electronic communications and surreptitiously retrieve stored information on private computer systems. Technology that was once the stuff of science fiction is now routinely used in real life to monitor the activities of citizens, corporations, even foreign nationals in foreign nations.2 Telephone conversations, text messages, electronic transmissions, and even corporate network traffic have been subject to surreptitious warrantless government surveillance by executive order under the mandate of heightened national security concerns in the “Post-9/11 Era.”3 Moreover, in addition to the fully-stocked arsenal of highly-advanced equipment and sophisticated technology the government enjoys, it can also rely upon lofty justifications such as “national security” and “the public good” to persuade or issue seemingly-reasonable directives to large private companies, such as the behemoth firms of AT&T, Verizon, and Bell South, to assist the government with warrantless investigations of private citizens and entities.4 1 For example, the “Warrantless Surveillance Controversy” by the U.S. National Security Agency (“NSA”) involved the surveillance of individuals on domestic soil and only incident to Post-9/11 foreign intelligence investigations by the NSA. This directive, termed the “Terrorist Surveillance Program” by the George W. Bush administration, was a component of the broader “President's Surveillance Program” which the NSA is authorized by executive order to monitor the communications of private citizens and companies without a warrant. Phone calls, e-mails, internet activity, text messaging, and other communications involving one party that the NSA may believe to be outside the United States were subject to warrantless government surveillance even if the other party was located on domestic soil. Widespread claims, however, indicate that such warrantless surveillance was conducted with respect to purely domestic communications. Due to the highly sensitive nature of the program, its exact scope is not known, but it is reported that the NSA had broad, unsupervised access to all fiber-optic communications of many of the major telecommunication companies’ communications and telephony traffic. 2 The National Security Agency (“NSA”) is charged with spying on and investigating foreign communications as part of its governmental directive. 3 It has also been reported that such programs operated without the judicial oversight that was mandated by Foreign Intelligence Surveillance Act (“FISA”). 4 The case of Hepting v. AT&T (06-CV-01791-VRW) (2006) uncovered the widespread assistance of several large telecommunications companies (in addition to AT&T) which were illegally collaborating with the National Security Agency to unlawfully spy on private citizens and companies. These companies were unlawfully monitoring the communications of the United States, including AT&T customers, businesses and third parties whose communications were routed through AT&T's network, as well as Voice over IP telephone calls routed via the internet. Unfortunately, much of the details could not be learned since the government resisted efforts to learn about the scope of the operation and since discovery could not be completed because District Court Judge Vaughn Walker dismissed the case in 2006 after the government provided retroactive immunity for any telecommunications companies illegally assisting the government thereby rendering the lawsuit moot.
  • 2. 2 The Federal Bureau of Investigation (“FBI”) routinely uses computer programs such as Magic Lantern,5 a secretly-installed key logger software, to spy on every keystroke made on a target’s computer – even if the communications occur inside the sanctity of one’s home.6 Another highly intrusive FBI software program, the Computer and Internet Protocol Address Verifier (“CIPAV”),7 is a data gathering software program that can track every email sent, every internet site visited, every software application installed by an individual or private company. It can also track the location of a computer through its IP address. Other government programs about which the public has extremely limited information include ESCHELON, “Cyber Knight,” and Carnivore,8,9 and other FBI-developed software programs used to monitor electronic communications. The government uses additional surreptitious data collection techniques and devices to warrantlessly investigate targets. The government may also, for example, remotely install a “Trojan Horse” virus, “rootkit” virus, or other sorts of spyware onto a target’s computer system. Doing so could allow an outsider to control an individual’s computer system remotely, monitor computer usage and transmissions, and remotely control a computer camera to spy on private activities.10 Other United States agencies, such as the National Security Agency, 11 continue to 5 Magic Lantern, a key logger software program developed by the Federal Bureau of Investigation, was first reported to be in existence on November 21, 2001. 6 The FBI's use of key logging software is discussed in the case of United States v. Scarfo, 180 F.Supp.2d 572 (D.N.J. 2001). See infra. 7 “Computer spy programs such as “CIPAV,” a software data gathering tool that the Federal Bureau of Investigation uses to track and gather location data on suspects who are under electronic surveillance. CIPAV captures location-related information of a computer, such as its IP address, MAC address, the programs which have been downloaded onto the computer, programs which are running on the program, the type of operating system, the installed application registration and version information, the default web browser, the URL of the last visited website. CIPAV silently monitors all outbound communication, logs every IP address to which the computer connects, and time stamps each internet encounter from that computer.” Wikipedia CIPAV page – http://en.wikipedia.org/wiki/Magic_Lantern_(software). 8 See http://en.wikipedia.org/wiki/Carnivore_(FBI). 9 http://email.about.com/od/staysecureandprivate/a/carnivore.htm 10 See, e.g., Selena Larson, 2017 Year in Review: The Hacks that Left Us Exposed in 2017, CNN Tech (December 20, 2017: 9:11 AM ET), http://money.cnn.com/2017/12/18/technology/biggest-cyberattacks-of-the- year/index.html. 11 For example, the National Security Agency routinely eavesdrops on all conversations, which was the tactic used to locate Osama Bin Laden. A NOVA documentary examined the high-tech eavesdropping carried out by the NSA. See “The Spy Factory – Examine the. Aired February 3, 2009 on PBS.”
  • 3. 3 develop additional tools with which to monitor citizens and private companies,12 such as cookies,13 web bugs,14 surreptitiously-installed spyware,15 and Radio Frequency Identification (“RFID”) tags.16 Unfortunately, such powerful governmental capabilities have not been tempered by the countervailing protective judicial or legislative safeguards necessary to offset the greatly increased potential for improper government intrusiveness. BY VANIA M. CHAKER, ESQ. VANIA CHAKER AT COLUMBIA SOCAL HTTPS://PLUS.GOOGLE.COM/114362351614525708773 WWW.VANIACHAKER.COM HTTPS://CASETEXT.COM/USERS/VANIA-CHAKER VANIA CHAKER VANIA CHAKER (@VMCHAKER) | TWITTER WWW.VANIACHAKERBLOG.WORDPRESS.COM HTTPS://WWW.LINKEDIN.COM/IN/VANIACHAKER/ VANIA CHAKER HTTPS://TWITTER.COM/VANIA_CHAKER VANIACHAKER@GMAIL.COM http://www.pbs.org/wgbh/nova/military/spy-factory.html. 12 Other programs also existed such as “COINTELPRO” (an acronym for Counter Intelligence Program) which was reported to have been a series of covert measures instituted by the FBI focused at investigating citizens and organizations within the United States during the Nixon administration. 13 A cookie has been defined as: “cookie (also tracking cookie, browser cookie, and HTTP cookie) is a small piece of text stored on a user's computer by a web browser. A cookie consists of one or more name-value pairs containing bits of information such as user preferences, shopping cart contents, the identifier for a server-based session, or other data used by websites.” http://en.wikipedia.org/wiki/HTTP_cookie. See also “magic cookie.” 14 Web bug has been defined as “an object that is embedded in a web page or e-mail and is usually invisible to the user but allows checking that a user has viewed the page or e-mail. One common use is in e-mail tracking. Alternative names are Web beacon, tracking bug, tracking pixel, pixel tag, 1×1 gif, and clear gif.” http://en.wikipedia.org/wiki/Web_bug 15 Spyware has been defined and discussed as follows: “as a type of malware that is installed on computers and collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as key loggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users. While the term spyware suggests software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity.” http://en.wikipedia.org/wiki/Spyware 16 Radio-frequency identification (RFID) has been defined as “the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader.”