Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News

      Wiretap Law to Fight Terrorism Used in Other Ways

      By
      Caron Carlson
      -
      May 21, 2003
      Share
      Facebook
      Twitter
      Linkedin

        New electronic surveillance powers enacted in the aftermath of the Sept. 11 terrorist attacks have been used widely by law enforcement agents, but not solely in pursuit of terrorism; some new powers bestowed by the USA PATRIOT Act allegedly have been used in cases involving drug violations and credit card fraud.

        Even as the law enforcement and defense communities consider requesting additional spying technologies and wiretap powers from Congress, lawmakers are taking a close, critical look at the powers enacted hastily in the USA PATRIOT Act. Tuesday, the House Judiciary Committee released the Justice Departments answers to dozens of questions lawmakers have raised.

        Charging that the USA PATRIOT Act was rushed into law without thoughtful consideration, Rep. Jerrold Nadler, D-N.Y., said its enactment was a “shameful procedure” driven by vague threats from the Bush administration that lives could be lost if Congress did not hurry.

        “With this kind of hysteria, the bill was passed almost sight unseen by this House,” Nadler said during a hearing of the House Judiciary Committee. “It is now time for a sober second look.”

        The second look includes a review of the emergency searches done under the auspices of the Foreign Intelligence Surveillance Act (FISA), passed in 1978. Over the course of one year, Attorney General John Ashcroft authorized 113 emergency electronic surveillance orders. In the previous 23 years, only 47 such authorizations were issued.

        Privacy advocates are particularly concerned about a provision in the USA PATRIOT Act that extends “trap and trace” and “pen register” authorities from the wireline telephone environment to the Internet and wireless networks. A full search warrant, which allows the interception of content, requires a showing of probable cause, but a trap and trace order, which allows the interception only of telephone digits dialed, requires a lower standard of judicial review. The problem for privacy rights advocates is that in Internet communications the equivalent of digits dialed is undefined, and content could be wrongly intercepted without a showing of probable cause.

        “The law as it now stands really doesnt have standards in it,” said Jim Dempsey, executive director of The Center for Democracy and Technology in Washington, adding that judges serve as rubber stamps. Dempsey urged lawmakers to amend the Act to require a minimal factual showing by law enforcement and a finding by a judge that the information sought under a pen register order would be relevant to an investigation.

        Meanwhile, the law enforcement and defense communities are developing powerful new electronic surveillance technologies that raise additional privacy concerns. Tuesday, the House technology and information policy subcommittee held the second in a series of hearings on data mining projects under way at the Defense Advanced Research Projects Agency, Transportation Security Agency and FBI. Lawmakers complained that despite testimony from the agencies, Congress is not being presented with an accurate picture of what is occurring in the government and how it affects privacy.

        “Our government is actively developing ways to circumvent our open government laws,” said William Lacy Clay, D-Mo. “The agencies involved in data mining are trying to skirt the Privacy Act by claiming that they hold no data. Instead, the agency contracts with a private company to hold the data and to mine it.”

        Latest Stories by Caron Carlson:

        Caron Carlson
        Get the Free Newsletter!
        Subscribe to Daily Tech Insider for top news, trends & analysis
        This email address is invalid.
        Get the Free Newsletter!
        Subscribe to Daily Tech Insider for top news, trends & analysis
        This email address is invalid.

        MOST POPULAR ARTICLES

        Latest News

        Zeus Kerravala on Networking: Multicloud, 5G, and...

        James Maguire - December 16, 2022 0
        I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
        Read more
        Applications

        Datadog President Amit Agarwal on Trends in...

        James Maguire - November 11, 2022 0
        I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
        Read more
        IT Management

        Intuit’s Nhung Ho on AI for the...

        James Maguire - May 13, 2022 0
        I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
        Read more
        Applications

        Kyndryl’s Nicolas Sekkaki on Handling AI and...

        James Maguire - November 9, 2022 0
        I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
        Read more
        Cloud

        IGEL CEO Jed Ayres on Edge and...

        James Maguire - June 14, 2022 0
        I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
        Read more
        Logo

        eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

        Facebook
        Linkedin
        RSS
        Twitter
        Youtube

        Advertisers

        Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

        Advertise with Us

        Menu

        • About eWeek
        • Subscribe to our Newsletter
        • Latest News

        Our Brands

        • Privacy Policy
        • Terms
        • About
        • Contact
        • Advertise
        • Sitemap
        • California – Do Not Sell My Information

        Property of TechnologyAdvice.
        © 2022 TechnologyAdvice. All Rights Reserved

        Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

        ×