The dread PATRIOT Act created many new powers for law-enforcement, including the ability to secure the prized super-warrants called National Security Letters without judicial oversight. In the time since PATRIOT was passed, their use by the FBI has increased by 10,000 percent
. Each of these warrants can be used to invade the lives of many Americans, and none of them are being issued with a judge's oversight after presentation of evidence justifying these intrusions into the lives of private individuals. These warrants are issued on a copper's say-so, without the due process that is the hallmarks of democracy.
How far can one FSA go? Well, in 2003, one was used to secure the records of guests in hotels in Las Vegas over a four-day period: 250,000 people (the investigation was inconclusive). The use of NSLs is common, but us hearing about them is rare: NSLs come with gag-orders that prohibit those who receive them from discussing them.
Issued by FBI field supervisors, national security letters do not need the imprimatur of a prosecutor, grand jury or judge. They receive no review after the fact by the Justice Department or Congress. The executive branch maintains only statistics, which are incomplete and confined to classified reports. The Bush administration defeated legislation and a lawsuit to require a public accounting, and has offered no example in which the use of a national security letter helped disrupt a terrorist plot.
The burgeoning use of national security letters coincides with an unannounced decision to deposit all the information they yield into government data banks -- and to share those private records widely, in the federal government and beyond. In late 2003, the Bush administration reversed a long-standing policy requiring agents to destroy their files on innocent American citizens, companies and residents when investigations closed. Late last month, President Bush signed Executive Order 13388, expanding access to those files for "state, local and tribal" governments and for "appropriate private sector entities," which are not defined...
A national security letter cannot be used to authorize eavesdropping or to read the contents of e-mail. But it does permit investigators to trace revealing paths through the private affairs of a modern digital citizen. The records it yields describe where a person makes and spends money, with whom he lives and lived before, how much he gambles, what he buys online, what he pawns and borrows, where he travels, how he invests, what he searches for and reads on the Web, and who telephones or e-mails him at home and at work.
(via Deep Links
The office I work in is full of things old people buy to make themselves feel young again. I can honestly say that our awesome new toy, The Swagtron T3 Hoverboard, makes me feel very, very old. I’ll explain why later. Swagtron T3 Pros There’s no way to overcharge the battery and that means no […]
One thing that’s consistent among amateur pool players is that they unknowingly stand up during their shots. Just as in golf, pool players need to keep their heads down and stay still after they shoot in order to hit straight. The DIGICUE helps keep shots consistent by letting you know every time you’ve had extra […]
A leaked memo from Apple CEO Tim Cook to his staff explaining why he met with Donald Trump — a guy who called Apple traitors for refusing to defeat their own security — explains the rationale: “tax reform.”
Using my iPhone while it’s charging is always a hassle. With tucked-away outlets and the meager length of included lightning cables, comfortable scrolling while plugged in is annoying. These 10-Ft MFi-Certified Lightning Cables are super convenient and probably the best iPhone accessory purchase I’ve made.At over three times the length of normal cables, these reach anywhere you […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]