Les anglonautes

About | Search | Vocapedia | Learning | Podcasts | Videos | History | Culture | Science | Translate

 Previous Home Up Next

 

Vocapedia > Terrorism > Counterterrorism > USA > FBI

 

Intelligence

 

Investigations / Probes, Surveillance, Privacy

 

Federal Bureau of Investigation (F.B.I.)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Why We Shouldn't Call the Capital Rioters

'Terrorists.'

NYT Opinion    1 February 2021

 

 

 

 

Why We Shouldn't Call the Capital Rioters 'Terrorists.'

Video        NYT Opinion        1 February 2021

 

Adama Bah was just 16 years old

when FBI agents stormed her family’s Harlem apartment in 2005

and arrested her,

falsely accusing her of being a potential suicide bomber.

 

She was held for six weeks in a youth detention facility

before being released with no charges.

 

This was post-9/11 America,

when ordinary Muslims were routinely targeted

by laws intended to prosecute terrorists.

 

In the video op-ed above,

Bah argues that although we do need to combat

white supremacist violence in America,

creating new antiterror laws to do so

— and expanding the War on Terror —

will only backfire on innocent Black and brown people.

 

YouTube

https://www.youtube.com/watch?v=YgY_7n74UgA

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Is Apple Right in Defying the F.B.I.?

Video

By EMMA COTT and BEN LAFFIN

NYT | Feb. 19, 2016 | 1:33

 

Apple has said it will not comply with a federal court order

to unlock the iPhone of one of the San Bernardino attackers.

 

Commenters online weigh privacy versus security

in an age of terrorism.

https://www.nytimes.com/video/us/100000004219045/
is-apple-right-in-defying-the-fbi.html

 

 

 

 

 

 

 

 

 

 

 

 

 

 

USA > Federal Bureau of Investigation    FBI        UK / USA

 

https://www.fbi.gov/

https://www.nytimes.com/topic/organization/
federal-bureau-of-investigation

 

 

2023

 

https://www.npr.org/2023/06/10/
1181516760/ted-kaczynski-unabomber-dies

 

https://www.nytimes.com/2023/04/17/
us/politics/justice-department-syria-war-crimes.html

 

https://www.nytimes.com/2023/04/12/
opinion/lyndon-johnson-martin-luther-king-jr.html

 

 

 

 

2022

 

https://www.nytimes.com/2022/11/23/
opinion/hoover-fbi-republicans-democrats.html

 

https://www.npr.org/2022/11/22/
1138189651/biography-j-edgar-hoover-gman-beverly-gage-fbi

 

https://www.theguardian.com/tv-and-radio/2022/jul/12/
bombs-blackmail-and-wire-taps-
how-i-spent-my-childhood-on-the-run-from-the-fbi

 

 

 

 

2021

 

https://www.nytimes.com/2021/12/22/
us/portland-protests-fbi-surveillance.html

 

https://www.theguardian.com/us-news/2021/sep/12/
fbi-document-shows-no-evidence-saudi-government-was-involved-in-911

 

https://www.nytimes.com/2021/09/01/
magazine/fbi-terrorism-terry-albury.html

 

https://www.npr.org/2021/02/26/
971993022/fbi-singles-out-
person-seen-on-video-spraying-capitol-police-officer-brian-sickn

 

https://www.theguardian.com/film/2021/feb/11/
judas-and-the-black-messiah-fred-hampton

 

https://www.npr.org/2021/02/09/
965791252/fbi-called-in-
after-hacker-tries-to-poison-tampa-area-citys-water-with-lye

 

https://www.nytimes.com/2021/02/02/
us/fbi-shooting-sunrise-florida.html

 

Why We Shouldn't Call the Capital Rioters 'Terrorists.'

video - NYT - 1 February 2021

https://www.youtube.com/watch?v=YgY_7n74UgA

 

 

 

 

https://www.npr.org/2021/01/29/
962268207/pipe-bombs-believed-to-have-been-placed-night-before-attack-on-u-s-capitol

 

https://www.npr.org/2021/01/18/
956741992/documentary-exposes-how-the-fbi-tried-to-destroy-mlk-with-wiretaps-blackmail

 

https://www.theguardian.com/film/2021/jan/14/
mlk-fbi-review-martin-luther-king-documentary-j-edgar-hoover

 

https://www.npr.org/2021/01/13/
956359496/why-didnt-the-fbi-and-dhs-produce-a-threat-report-ahead-of-the-capitol-insurrect

 

https://www.propublica.org/article/
domestic-terrorism-a-more-urgent-threat-but-weaker-laws - Jan. 7, 2021

 

https://www.nytimes.com/2021/01/01/
opinion/letters/blackwater-pardons.html

 

 

 

 

2020

 

https://www.npr.org/2020/12/21/
947542134/32-years-later-u-s-to-charge-alleged-bomb-maker-in-pan-am-flight-103-attack

 

https://www.theguardian.com/commentisfree/2020/jun/26/
fbi-black-activism-protests-history

 

https://www.npr.org/2020/03/26/
821783492/u-s-officials-believe-ex-fbi-agent-who-disappeared-in-iran-in-2007-is-dead

 

 

 

 

2018

 

https://www.npr.org/2018/11/20/
669761157/fbi-categorizes-proud-boys-as-extremist-group-with-ties-to-white-nationalism

 

https://www.npr.org/2018/02/02/
582713363/memo-russian-overtures-to-trump-aide-triggered-fbi-investigation

 

https://www.nytimes.com/2018/02/02/
opinion/leaving-the-fbi.html

 

https://www.nytimes.com/2018/02/01/
opinion/trump-fbi-winner-justice.html

 

https://www.nytimes.com/2018/02/01/
opinion/dont-believe-the-liberal-fbi.html

 

https://www.npr.org/2018/01/26/
580677742/the-massive-case-of-collective-amnesia-the-fbi-has-been-political-from-the-start

 

 

 

 

2017

 

https://www.npr.org/2017/12/24/
573275428/trump-uses-twitter-to-criticize-fbi-deputy-director-andrew-mccabe

 

https://www.npr.org/2017/12/01/
561238303/michael-flynn-sr-expected-to-plead-guilty-to-lying-to-fbi

 

https://www.npr.org/2017/08/22/
545122205/fbi-profiler-says-linguistic-work-was-pivotal-in-capture-of-unabomber

 

https://www.nytimes.com/2017/06/09/
insider/a-photo-of-james-comey-takes-the-internet-by-storm.html

 

http://www.npr.org/2017/06/08/
532102878/i-hope-there-are-tapes-highlights-of-james-comeys-testimony

 

https://www.youtube.com/watch?v=U89ijj2Yu08 - 8 June 2017

 

http://www.npr.org/sections/parallels/2017/05/17/
528609228/commentary-how-trumps-information-sharing-hurts-the-intelligence-community

 

http://www.npr.org/2017/05/17/
528846598/former-fbi-director-mueller-appointed-special-counsel-to-oversee-russia-probe

 

http://www.npr.org/2017/05/15/
527773206/what-just-happened-the-james-comey-saga-in-timeline-form

 

http://www.npr.org/2017/05/17/
528776862/its-falling-out-of-the-trees-former-prosecutor-says-of-obstruction-evidence

 

http://www.npr.org/2017/05/17/
528743744/the-president-the-comey-memo-and-the-elephant-in-the-room-impeachment

 

http://www.npr.org/2017/05/16/
528679977/trump-asked-comey-to-shut-down-flynn-investigation

 

https://apps.npr.org/documents/
document.html?id=3726378-Order-3915-2017-of-Appointment-of-Special

 

https://www.nytimes.com/2017/05/09/
opinion/donald-trumps-firing-of-james-comey.html

 

https://www.nytimes.com/2017/05/09/
opinion/donald-trump-is-lying-again-now-about-james-comey.html

 

http://www.npr.org/2017/05/09/
527663050/president-trump-fires-fbi-director-james-comey

 

http://www.npr.org/sections/thetwo-way/2017/03/20/
520865505/the-fbi-is-on-the-case-and-other-takeaways-from-the-house-intel-hearing

 

 

 

 

2016

 

http://www.nytimes.com/2016/11/24/
world/middleeast/isis-recruiters-social-media.html

 

http://www.gocomics.com/jimmorin/2016/11/06

 

http://www.gocomics.com/claybennett/2016/11/02

 

http://www.gocomics.com/tomtoles/2016/11/01

 

http://www.npr.org/2016/10/31/
500034905/ex-justice-department-official-critical-of-fbi-directors-email-letter

 

http://www.npr.org/2016/10/31/
500034870/fbi-obtains-a-warrant-to-review-newly-discovered-emails

 

http://www.npr.org/sections/thetwo-way/2016/10/29/
499868601/fbi-head-under-fire-for-restarting-clinton-email-investigation-days-before-elect

 

http://www.nytimes.com/2016/06/15/us/
politics/noor-zahi-salman-omar-mateen.html

 

http://www.nytimes.com/2016/06/08/us/
fbi-isis-terrorism-stings.html

 

http://www.nytimes.com/2016/06/08/us/
fbi-isis-terrorism-stings.html

 

http://www.npr.org/sections/alltechconsidered/2016/05/18/
477819617/facebooks-facial-recognition-software-is-different-from-the-fbis-heres-why

 

http://www.nytimes.com/2016/04/20/
technology/fbi-iphone-apple-house-encryption-hearing.html

 

http://www.npr.org/sections/alltechconsidered/2016/03/29/
472141323/apple-vs-the-fbi-the-unanswered-questions-and-unsettled-issues

 

http://www.npr.org/sections/thetwo-way/2016/03/28/
472192080/the-fbi-has-successfully-unlocked-the-iphone-without-apples-help

 

http://www.npr.org/sections/alltechconsidered/2016/03/22/
471416946/from-reagans-cyber-plan-to-apple-vs-fbi-everything-is-up-for-grabs

 

http://www.npr.org/sections/thetwo-way/2016/03/15/
470436785/apple-on-fbi-iphone-request-the-founders-would-be-appalled

 

http://www.npr.org/sections/thetwo-way/2016/02/17/
467096705/apple-the-fbi-and-iphone-encryption-a-look-at-whats-at-stake

 

http://www.npr.org/2016/01/29/
464804842/fbi-releases-aerial-surveillance-video-of-refuge-occupiers-death

 

 

 

 

2015

 

http://www.nytimes.com/2015/11/03/
opinion/how-the-fbi-can-detain-render-and-threaten-without-risk.html

 

https://www.npr.org/sections/codeswitch/2015/06/27/
417175523/grace-lee-boggs-activist-and-american-revolutionary-turns-100

 

http://www.nytimes.com/2015/01/12/us/politics/
beyond-nsa-fbi-is-assuming-a-larger-surveillance-role-report-shows.html

 

 

 

 

2013

 

http://www.npr.org/2013/08/23/
214549458/outgoing-fbi-boss-on-his-legacy-and-what-kept-him-up-at-night

 

http://www.nytimes.com/2013/04/19/us/
fbi-releases-video-of-boston-bombing-suspects.html

 

http://www.nytimes.com/2013/04/18/us/
boston-investigation-moves-into-third-day.html

 

http://www.nytimes.com/2013/03/16/us/
cartha-d-deloach-no-3-in-fbi-is-dead-at-92.html

 

 

 

 

https://www.npr.org/2011/12/28/
144393904/fact-checking-eastwoods-j-edgar-biopic

 

 

 

 

https://www.theguardian.com/world/2010/mar/16/
fbi-facebook-crime-study

 

 

 

 

http://www.nytimes.com/2009/10/29/us/
29shooting.html

 

Delayed Justice A Salve For Mississippi's Wounds?

https://www.npr.org/templates/story/
story.php?storyId=113432666 - October 3, 2009

 

An FBI Man's Inside View of '60s America In Turmoil

https://www.npr.org/transcripts/111659247 - August 7, 2009

 

 

 

 

http://www.npr.org/templates/story/story.php
?storyId=92207687 - July 5, 2008

 

http://www.usatoday.com/news/nation/2006-03-20-
moussaoui_x.htm

 

 

 

 

https://www.nytimes.com/2000/07/01/
world/fbi-watched-an-american-who-was-killed-in-chile-coup.html

 

 

 

 

 

 

 

The Apple-FBI Debate Over Encryption        USA        2016

 

https://www.npr.org/series/469827708/
the-apple-fbi-debate-over-encryption

 

 

 

 

 

 

 

F.B.I. personnel

http://www.nytimes.com/2013/04/18/
us/boston-investigation-moves-into-third-day.html

 

 

 

 

F.B.I. agent / FBI agent

 

 

 

 

FBI Special Agent-In-Charge Matthew Pellegrino

 

 

 

 

 

an FBI affidavit filed in U.S. District Court

 

 

 

 

undercover FBI agents

http://www.npr.org/sections/thetwo-way/2015/08/31/
436414417/wichita-man-sentenced-to-20-years-in-airport-bomb-plot

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

criminal profiler

 

https://www.npr.org/2017/08/22/
545122205/fbi-profiler-says-linguistic-work-was-pivotal-in-capture-of-unabomber

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

sting

http://www.nytimes.com/2016/06/08/
us/fbi-isis-terrorism-stings.html

 

 

 

 

F.B.I.’s watch list

http://www.nytimes.com/2011/09/28/
us/even-those-cleared-of-crimes-can-stay-on-fbis-terrorist-watch-list.html

 

 

 

 

FBI's Most Wanted List

http://www.usatoday.com/news/nation/2006-08-29-
jeffs_x.htm

 

 

 

 

intelligence

https://www.propublica.org/article/
domestic-terrorism-a-more-urgent-threat-but-weaker-laws - Jan. 7, 2021

 

 

 

 

wiretap

http://www.nytimes.com/2013/05/08/
us/politics/obama-may-back-fbi-plan-to-wiretap-web-users.html

 

 

 

 

eavesdropping

http://www.nytimes.com/2012/02/04/
us/fbi-admits-hacker-groups-eavesdropping.html

 

 

 

 

 FBI's facial recognition technology

http://www.npr.org/sections/alltechconsidered/2016/05/18/
477819617/facebooks-facial-recognition-software-is-different-from-the-fbis-heres-why

 

 

 

 

privacy

http://www.npr.org/sections/alltechconsidered/2016/03/22/
471416946/from-reagans-cyber-plan-to-apple-vs-fbi-everything-is-up-for-grabs

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FBI directors > James Comey

 

https://www.npr.org/2021/01/12/
956103556/james-comey-
trump-should-be-impeached-but-not-federally-prosecuted

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Hoover, center, taking aim

while giving the Broadway actors flanking him,

William Gaxton and Vincent Moore,

a tour of F.B.I. headquarters in 1935.

 

Photograph: Underwood and Underwood

 

OPINION

GUEST ESSAY

To Understand the F.B.I., You Have to Understand J. Edgar Hoover

BYT

Nov. 23, 2022    5:00 a.m. ET

https://www.nytimes.com/2022/11/23/
opinion/hoover-fbi-republicans-democrats.html

 

 

 

 

 

 

 

USA > FBI directors >

John Edgar Hoover    1895-1972        UK / USA

 

https://www.nytimes.com/2023/04/12/
opinion/lyndon-johnson-martin-luther-king-jr.html

 

https://www.theguardian.com/books/2023/mar/21/
the-gospel-of-j-edgar-hoover-lerone-martin

 

 

 

 

https://www.nytimes.com/2022/11/23/
opinion/hoover-fbi-republicans-democrats.html

 

https://www.npr.org/2022/11/22/
1138189651/biography-j-edgar-hoover-gman-beverly-gage-fbi

 

 

 

 

https://www.npr.org/2012/10/03/
161408561/did-man-who-armed-black-panthers-lead-two-lives

 

 

 

 

https://www.nytimes.com/1972/05/03/
archives/j-edgar-hoover-77-dies-
will-lie-in-state-in-capitol-j-edgar-hoover.html

 

 

 

 

 

 

 

 

 

FBI directors > John Edgar Hoover    1895-1972

movies > 2011 > Clint Eastwood's 'J. Edgar'

 

https://www.npr.org/2012/02/24/
147340404/dustin-lance-black-telling-the-story-of-j-edgar

 

https://www.npr.org/2011/12/28/
144393904/fact-checking-eastwoods-j-edgar-biopic

 

https://www.npr.org/2011/11/11/
142234884/clint-eastwood-takes-on-an-fbi-legend-in-j-edgar

 

https://www.npr.org/2011/11/08/
142138378/leonardo-dicaprio-brings-the-complex-j-edgar-to-life-on-film

 

https://www.npr.org/2011/11/07/
142093689/j-edgar-at-the-fbi-many-a-question-about-hoover

 

 

 

 

 

 

 

 

 

Corpus of news articles

 

Terrorism > Counterterrorism

 

Investigations / Probes, Surveillance, Privacy > USA

 

Federal Bureau of Investigation (F.B.I.)

 

 

 

Even Those Cleared of Crimes

Can Stay on F.B.I.’s Watch List

 

September 27, 2011

The New York Times

By CHARLIE SAVAGE

 

WASHINGTON — The Federal Bureau of Investigation is permitted to include people on the government’s terrorist watch list even if they have been acquitted of terrorism-related offenses or the charges are dropped, according to newly released documents.

The files, released by the F.B.I. under the Freedom of Information Act, disclose how the police are instructed to react if they encounter a person on the list. They lay out, for the first time in public view, the legal standard that national security officials must meet in order to add a name to the list. And they shed new light on how names are vetted for possible removal from the list.

Inclusion on the watch list can keep terrorism suspects off planes, block noncitizens from entering the country and subject people to delays and greater scrutiny at airports, border crossings and traffic stops.

The database now has about 420,000 names, including about 8,000 Americans, according to the statistics released in connection with the 10th anniversary of the Sept. 11 attacks. About 16,000 people, including about 500 Americans, are barred from flying.

Timothy J. Healy, the director of the F.B.I.’s Terrorist Screening Center, which vets requests to add or remove names from the list, said the documents showed that the government was balancing civil liberties with a careful, multilayered process for vetting who goes on it — and for making sure that names that no longer need to be on it came off.

“There has been a lot of criticism about the watch list,” claiming that it is “haphazard,” he said. “But what this illustrates is that there is a very detailed process that the F.B.I. follows in terms of nominations of watch-listed people.”

Still, some of the procedures drew fire from civil liberties advocates, including the Electronic Privacy Information Center, which made the original request and provided the documents to The New York Times.

The 91 pages of newly disclosed files include a December 2010 guidance memorandum to F.B.I. field offices showing that even a not-guilty verdict may not always be enough to get someone off the list, if agents maintain they still have “reasonable suspicion” that the person might have ties to terrorism.

“If an individual is acquitted or charges are dismissed for a crime related to terrorism, the individual must still meet the reasonable suspicion standard in order to remain on, or be subsequently nominated to, the terrorist watch list,” the once-classified memorandum says.

Ginger McCall, a counsel at the Electronic Privacy Information Center, said: “In the United States, you are supposed to be assumed innocent. But on the watch list, you may be assumed guilty, even after the court dismisses your case.”

But Stewart Baker, a former Homeland Security official in the Bush administration, argued that even if the intelligence about someone’s possible terrorism ties fell short of the courtroom standard of “beyond a reasonable doubt,” it could still be appropriate to keep the person on the watch list as having attracted suspicion.

Mr. Baker noted that being subjected to extra questioning — or even kept off flights — was different than going to prison.

The guidance memo to F.B.I. field offices says someone may be deemed a “known or suspected terrorist” if officials have “particularized derogatory information” to support their suspicions.

That standard may be met by an allegation that the suspect has terrorism ties if the claim is corroborated by at least one other source, it said, but “mere guesses or ‘hunches’ are not enough.”

Normally, it says, if agents close the investigation without charges, they should remove the subject’s name — as they should also normally do in the case of an acquittal. But for exceptions, the F.B.I. maintains a special file for people whose names it is keeping in the database because it has decided they pose a national security risk even they are not the subject any active investigation.

The F.B.I.’s Terrorist Screening Center shares the data with other federal agencies for screening aircraft passengers, people who are crossing the border and people who apply for visas. The data is also used by local police officers to check names during traffic stops.

The December memorandum lays out procedures for police officers to follow when they encounter people who are listed. For example, officers are never to tell the suspects that they might be on the watch list, and they must immediately call the federal government for instructions.

In addition, it says, police officers and border agents are to treat suspects differently based on which “handling codes” are in the system.

Some people, with outstanding warrants, are to be arrested; others are to be questioned while officers check with the Department of Homeland Security to see whether it has or will issue a “detainer” request; and others should be allowed to proceed without delay.

The documents show that the F.B.I. is developing a system to automatically notify regional “fusion centers,” where law enforcement agencies share information, if officers nearby have encountered someone on the list. The bureau also requires F.B.I. supervisors to sign off before an advisory would warn the police that a subject is “armed and dangerous” or has “violent tendencies.”

The F.B.I. procedures encourage agents to renominate suspects for the watch list even if they were already put on it by another agency — meaning multiple agencies would have to be involved in any attempt to later remove that person.

The procedures offer no way for people who are on the watch list to be notified of that fact or given an opportunity to see and challenge the specific allegations against them.

Chris Calabrese, a counsel with the American Civil Liberties Union, called the watch list system a “Star Chamber” — “a secret determination, that you have no input into, that you are a terrorist. Once that determination is made, it can ripple through your entire life and you have no way to challenge it.”

But Mr. Healy said the government could not reveal who was on the list, or why, because that would risk revealing intelligence sources. He also defended the idea of the watch list, saying the government would be blamed if, after a terrorist attack, it turned out the perpetrator had attracted the suspicions of one agency but it had not warned other agencies to scrutinize the person.

Mr. Healy also suggested that fears of the watch list were exaggerated, in part because there are many other reasons that people are subjected to extra screening at airports. He said more than 200,000 people have complained to the Department of Homeland Security about their belief that they were wrongly on the list, but fewer than 1 percent of them were actually on it.

Even Those Cleared of Crimes Can Stay on F.B.I.’s Watch List,
NYT,
27.9.2011,
https://www.nytimes.com/2011/09/28/
us/even-those-cleared-of-crimes-can-stay-
on-fbis-terrorist-watch-list.html

 

 

 

 

 

U.S. Is Working to Ease Wiretaps

on the Internet

 

September 27, 2010

The New York Times

By CHARLIE SAVAGE

 

WASHINGTON — Federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet, arguing that their ability to wiretap criminal and terrorism suspects is “going dark” as people increasingly communicate online instead of by telephone.

Essentially, officials want Congress to require all services that enable communications — including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct “peer to peer” messaging like Skype — to be technically capable of complying if served with a wiretap order. The mandate would include being able to intercept and unscramble encrypted messages.

The bill, which the Obama administration plans to submit to lawmakers next year, raises fresh questions about how to balance security needs with protecting privacy and fostering innovation. And because security services around the world face the same problem, it could set an example that is copied globally.

James X. Dempsey, vice president of the Center for Democracy and Technology, an Internet policy group, said the proposal had “huge implications” and challenged “fundamental elements of the Internet revolution” — including its decentralized design.

“They are really asking for the authority to redesign services that take advantage of the unique, and now pervasive, architecture of the Internet,” he said. “They basically want to turn back the clock and make Internet services function the way that the telephone system used to function.”

But law enforcement officials contend that imposing such a mandate is reasonable and necessary to prevent the erosion of their investigative powers.

“We’re talking about lawfully authorized intercepts,” said Valerie E. Caproni, general counsel for the Federal Bureau of Investigation. “We’re not talking expanding authority. We’re talking about preserving our ability to execute our existing authority in order to protect the public safety and national security.”

Investigators have been concerned for years that changing communications technology could damage their ability to conduct surveillance. In recent months, officials from the F.B.I., the Justice Department, the National Security Agency, the White House and other agencies have been meeting to develop a proposed solution.

There is not yet agreement on important elements, like how to word statutory language defining who counts as a communications service provider, according to several officials familiar with the deliberations.

But they want it to apply broadly, including to companies that operate from servers abroad, like Research in Motion, the Canadian maker of BlackBerry devices. In recent months, that company has come into conflict with the governments of Dubai and India over their inability to conduct surveillance of messages sent via its encrypted service.

In the United States, phone and broadband networks are already required to have interception capabilities, under a 1994 law called the Communications Assistance to Law Enforcement Act. It aimed to ensure that government surveillance abilities would remain intact during the evolution from a copper-wire phone system to digital networks and cellphones.

Often, investigators can intercept communications at a switch operated by the network company. But sometimes — like when the target uses a service that encrypts messages between his computer and its servers — they must instead serve the order on a service provider to get unscrambled versions.

Like phone companies, communication service providers are subject to wiretap orders. But the 1994 law does not apply to them. While some maintain interception capacities, others wait until they are served with orders to try to develop them.

The F.B.I.’s operational technologies division spent $9.75 million last year helping communication companies — including some subject to the 1994 law that had difficulties — do so. And its 2010 budget included $9 million for a “Going Dark Program” to bolster its electronic surveillance capabilities.

Beyond such costs, Ms. Caproni said, F.B.I. efforts to help retrofit services have a major shortcoming: the process can delay their ability to wiretap a suspect for months.

Moreover, some services encrypt messages between users, so that even the provider cannot unscramble them.

There is no public data about how often court-approved surveillance is frustrated because of a service’s technical design.

But as an example, one official said, an investigation into a drug cartel earlier this year was stymied because smugglers used peer-to-peer software, which is difficult to intercept because it is not routed through a central hub. Agents eventually installed surveillance equipment in a suspect’s office, but that tactic was “risky,” the official said, and the delay “prevented the interception of pertinent communications.”

Moreover, according to several other officials, after the failed Times Square bombing in May, investigators discovered that the suspect, Faisal Shahzad, had been communicating with a service that lacked prebuilt interception capacity. If he had aroused suspicion beforehand, there would have been a delay before he could have been wiretapped.

To counter such problems, officials are coalescing around several of the proposal’s likely requirements:

¶ Communications services that encrypt messages must have a way to unscramble them.

¶ Foreign-based providers that do business inside the United States must install a domestic office capable of performing intercepts.

¶ Developers of software that enables peer-to-peer communication must redesign their service to allow interception.

Providers that failed to comply would face fines or some other penalty. But the proposal is likely to direct companies to come up with their own way to meet the mandates. Writing any statute in “technologically neutral” terms would also help prevent it from becoming obsolete, officials said.

Even with such a law, some gaps could remain. It is not clear how it could compel compliance by overseas services that do no domestic business, or from a “freeware” application developed by volunteers.

In their battle with Research in Motion, countries like Dubai have sought leverage by threatening to block BlackBerry data from their networks. But Ms. Caproni said the F.B.I. did not support filtering the Internet in the United States.

Still, even a proposal that consists only of a legal mandate is likely to be controversial, said Michael A. Sussmann, a former Justice Department lawyer who advises communications providers.

“It would be an enormous change for newly covered companies,” he said. “Implementation would be a huge technology and security headache, and the investigative burden and costs will shift to providers.”

Several privacy and technology advocates argued that requiring interception capabilities would create holes that would inevitably be exploited by hackers.

Steven M. Bellovin, a Columbia University computer science professor, pointed to an episode in Greece: In 2005, it was discovered that hackers had taken advantage of a legally mandated wiretap function to spy on top officials’ phones, including the prime minister’s.

“I think it’s a disaster waiting to happen,” he said. “If they start building in all these back doors, they will be exploited.”

Susan Landau, a Radcliffe Institute of Advanced Study fellow and former Sun Microsystems engineer, argued that the proposal would raise costly impediments to innovation by small startups.

“Every engineer who is developing the wiretap system is an engineer who is not building in greater security, more features, or getting the product out faster,” she said.

Moreover, providers of services featuring user-to-user encryption are likely to object to watering it down. Similarly, in the late 1990s, encryption makers fought off a proposal to require them to include a back door enabling wiretapping, arguing it would cripple their products in the global market.

But law enforcement officials rejected such arguments. They said including an interception capability from the start was less likely to inadvertently create security holes than retrofitting it after receiving a wiretap order.

They also noted that critics predicted that the 1994 law would impede cellphone innovation, but that technology continued to improve. And their envisioned decryption mandate is modest, they contended, because service providers — not the government — would hold the key.

“No one should be promising their customers that they will thumb their nose at a U.S. court order,” Ms. Caproni said. “They can promise strong encryption. They just need to figure out how they can provide us plain text.”

U.S. Is Working to Ease Wiretaps on the Internet,
NYT,
27.9.2010,
https://www.nytimes.com/2010/09/27/
us/27wiretap.html 

 

 

 

 

 

Terrorist watch list hits 1 million

 

10 March 2009

USA Today

By Peter Eisler

 

WASHINGTON — The government's terrorist watch list has hit 1 million entries, up 32% since 2007.

Federal data show the rise comes despite the removal of 33,000 entries last year by the FBI's Terrorist Screening Center in an effort to purge the list of outdated information and remove people cleared in investigations.

It's unclear how many individuals those 33,000 records represent — the center often uses multiple entries, or "identities," for a person to reflect variances in name spellings or other identifying information. The remaining million entries represent about 400,000 individuals, according to the center.

The new figures were provided by the screening center and the Office of the Director of National Intelligence in response to requests from USA TODAY.

"We're continually trying to improve the quality of the information," says Timothy Edgar, a civil liberties officer at the intelligence director's office. "It's always going to be a work in progress."

People put on the watch list by intelligence and law enforcement agencies can be blocked from flying, stopped at borders or subjected to other scrutiny. About 95% of the people on the list are foreigners, the FBI says, but it's a source of frequent complaints from U.S. travelers.

In the past two years, 51,000 people have filed "redress" requests claiming they were wrongly included on the watch list, according to the Department of Homeland Security. In the vast majority of cases reviewed so far, it has turned out that the petitioners were not actually on the list, with most having been misidentified at airports because their names resembled others on it.

There have been 830 redress requests since 2005 where the person was, in fact, confirmed to be on the watch list, and further review by the screening center led to the removal of 150, or 18% of them.

Without specific rules for who goes on the list, it's too bloated to be effective, says Tim Sparapani, a lawyer with the American Civil Liberties Union.

A 2007 audit by the Government Accountability Office said more needed to be done to ensure the list's accuracy, but still found that it has "enhanced the U.S. government's counterterrorism efforts."

Terrorist watch list hits 1 million,
UT,
10.3.2009,
https://usatoday30.usatoday.com/news/washington/2009-03-10-watchlist_N.htm - broken link

 

 

 

 

 

 

 

 

 

Related > Anglonautes > Vocapedia

 

USA > Federal Bureau of Investigation (F.B. I)

Crime, Domestic terrorism

 

 

USA > counterterrrorism, security,

eavesdropping, intelligence, surveillance

 

 

terrorism > USA > security, eavesdropping,

intelligence, surveillance > NSA

 

 

surveillance >

biometrics, face-recognition technology

 

 

war, terrorism, peace >

intelligence, espionage, spying

 

 

USA > U.S. Constitution >

Fourth Amendment

 

 

war > drones

 

 

religion / faith,

abuse, sexual abuse, violence, extremism,

secularism, atheism

 

 

www > Internet freedom / censorship

 

 

www > browsing / searching > privacy

 

 

www > privacy > web tracking

 

 

www > social networking > privacy

 

 

www > WikiLeaks

 

 

 

 

 

Related > Anglonautes > Videos > Explainers

 

USA > America's intelligence community

 

 

 

 

 

Related > Anglonautes > History > 21st century > USA

 

2011 > Terrorism (II) > Pakistan >

Bin Laden is killed

 

 

2001 > 9/11

 

 

2001 > 9/11 > Frontpages

 

 

 

 

 

Related > Anglonautes > History > 20th century > UK, USA

 

1988 > UK > Scotland > Lockerbie plane bombing

 

 

Civil rights > USA > Black power > Timeline

 

 

Civil rights > USA > Timeline

 

 

Civil rights > USA >

Martin Luther King Jr. / MLK    1929-1968

 

 

 

 

 

Related > Anglonautes > Arts

 

Cartoons > 11 September 2001 (9/11)

 

 

 

 

 

Related > Anglonautes > Videos > Documentaries > 2010s

 

Surveillance > NSA

 

 

Terrorism > 9/11

 

 

Terrorism > 9/11 > CIA > torture

 

 

USA / Cuba > Terrorism > Guantánamo Bay

 

 

War

 

 

 

home Up