ACLU Wants the Feds To Fess Up About Email Snooping
The American Civil Liberties Union wants the Federal Bureau of Investigation to answer a few questions about how it scoops up that oh-so-don't worry-about-it metadata the feds keeps saying is perfectly legitimate to collect. For instane, is it true the FBI uses "port readers" to mass-copy whole emails, including content, and then erases the messages and just keeps the metadata? This is important not just in bureau activities, but because we've learned that the NSA's domestic spying programs take place under the authority of the FBI.
From the ACLU:
Yesterday, we filed a Freedom of Information Act request with the FBI asking for details about a surveillance tool we know too little about, called a port reader. According to news reports, port readers copy entire emails and instant messages as they move through networks, in real time. They then delete the contents of the messages, leaving only the "metadata" — the sender, recipient, and time of a message, and maybe even the location from which it was sent — behind for the government. According to the same reports, the FBI is taking steps to install port readers on the networks of major U.S. phone and Internet companies, going so far as to make threats of contempt of court to providers that don't cooperate.
The use of port readers isn't a new revelation, as news travels these days. CNet reported last August about the feds putting the squeeze on Internet service providers to build the technology into their systems so agents could drink from the stream at will. But the formal ACLU FOIA filing is new, and could tell us just deeply burrowed into our communications the government has been all this time, and just how much "trust us" they expect the American public to swallow.
Among the questions the ACLU wants answered are those below:
- Policies, procedures, practices, and legal memos relating to the installation and use of port reader processes, devices, hardware, software, or firmware;
- Technical specifications for the installation and use of port reader processes, devices, hardware, software, or firmware (including any relevant API, ABI, or network protocol specification);
- What kinds ofintemet traffic (i.e., what protocols) are captured by port reader processes, devices, hardware, software, or firmware;
- What categories of metadata port reader processes, devices, hardware, software, or firmware are capable of capturing, and which categories are in fact collected;
- Whether and to what extent port readers copy or retain communications content, including any content of emails, any content of instant messages, and any addresses of web pages visited;
- How many communications have had their content or metadata copied or retained using port reader processes, devices, hardware, software, or firmware;
- How many individuals have had their communications metadata or content copied or retained using port reader processes, devices, hardware, software, or firmware;
- Whether telecommunications carriers and Internet service providers have installed port reader processes, devices, hardware, software, or firmware;
- The case name, docket number, and court of any legal proceeding in which any private entity has challenged or resisted the installation and use of port reader processes, devices, hardware, software, or firmware;
- Pursuant to which legal authorities the FBI bases its claim that it may lawfully request or compel the installation and/or use of port reader processes, devices, hardware, software or firmware.
- The name of the tool identified by CNET and Foreign Policy as a port reader.
The answers should be fascinating, but don't hold your breath while you wait for the FBI to cooperate.
Show Comments (9)