In a fascinating article by Declan McCullagh, CNET is reporting that the U.S. government is “pressuring” telecommunications providers to install eavesdropping software on their internal networks in order to assist in governmental surveillance activities. Apparently, the FBI has asserted that the software’s interception of metadata is authorized under the Patriot Act. It remains unclear; however, to what extent these “port carriers” have actually been installed by carriers. According to McCullagh, AT&T, T-Mobile, Verizon, Comcast and Sprint have all declined to comment. “A government source familiar with the port reader software said it is not used on an industry-wide basis, and only in situations where carriers’ own wiretap compliance technology is insufficient to provide agents with what they are seeking,” writes McCullagh.
Generally speaking, police and other investigative agencies are required to obtain a court order to intercept the content of real-time communications. In addition to email, this would include information available via social media platforms, such as Facebook and others. It is important to understand the distinction between information that falls into the pen register category and that which falls into the more substantive, content category. Pen register type data includes metadata, such as “IP addresses, email addresses, identities of Facebook correspondents, web sites visited, and possibly search terms as well.” Access to pen register has historically required a lower bar for access by investigators than other forms of investigative practices, such as wiretapping where full blown communications can be monitored.
The concern with the software that would be used by the carriers at the government’s prodding is that the software might collect more information than would necessarily fall under a pen register type of collection. According to a source cited in the article, “the FBI wants providers to use their existing CALEA [Communications Assistance for Law Enforcement Act] compliance hardware to rout the targeted customer’s communications through the port reader software. The software discards the content data and extracts the metadata, which is then provided to the bureau.”
The CNET article can be found here. http://news.cnet.com/8301-13578_3-57596791-38/fbi-pressures-internet-providers-to-install-surveillance-software/
Showing posts with label Spying. Show all posts
Showing posts with label Spying. Show all posts
Wednesday, August 7, 2013
Wednesday, June 26, 2013
Fraud Examiners are Using Social Media to Gather Information
Forbes’s Walter Pavlo, who dedicates his column to white
collar-crime, has an eye-opening piece on how fraud examiners are using social
media to gather information on targets.
The column centers on a meeting in Las
Vegas of the Association of Fraud Examiners.
The article makes the point that frequently people enjoy
bragging about their interests on social media sites, such as Facebook,
LinkedIn, Twitter and Pinterest.
Investigators are able to observe what individuals are claiming on
social media and reconcile that same information with the target’s apparent
means. As the piece observes, “Bill in
Accounting”, ‘who makes $100K/year is tweeting about his new Ferrari.” Obviously, a red flag.
The four key areas for consideration related to the
performance of an online investigation include:
·
finding out where people are claiming to spend
their time;
·
assess a person’s “Likes” and “Dislikes”;
·
look for clues to determine other social media
sites the target is visiting; and
·
see who people are following and being followed
by and look for conflicts of interest.
Pavlo’s piece underscores the double-edged nature of the
transparency social media brings with it.
As a society we might appreciate the effective way investigators utilize
tools to bring potential wrongdoers to justice, as individuals it may make us
inclined to look over our shoulders to see who is peering and wonder what their
motivation is.
You can read the full article at http://www.forbes.com/sites/walterpavlo/2013/06/25/criminals-beware-fraud-investigators-take-to-social-media/.
Subscribe to:
Comments (Atom)

