From the Open-Publishing Calendar
From the Open-Publishing Newswire
Indybay Feature
DOJ brags
J u s t i c e D e p a r t m e n t A c c o m p l i s h m e n t s i n t h e W a r on T e r r o r i s m
The Shift from Investigation to Prevention
The Shift from Investigation to Prevention
http://www.politechbot.com/docs/doj.accomplishments.090902.doc
- FBI: $412 million in additional funds as follows: $223 million to increase intelligence and surveillance capabilities, response capabilities, and additional equipment and support personnel; $109 million to enhance various FBI information technology projects, including digital storage of documents, data management and warehousing, collaborative capabilities, IT support for Legal Attaches, continuity of operations, video teleconferencing capabilities, and Trilogy support and mainframe data center upgrades; and $78 million to harden FBI information systems against inappropriate and illegal use and intrusion, and to conduct background investigations. The total proposed FY 2003 budget for the FBI ($4.3 billion) is a 19% increase over FY 2002 ($3.6 billion pre-CT Supplemental). With these increases, the FBI budget has increased by almost one-third over the past two years (29%).
· State and Local Anti-Terrorism Training (SLATT) Program Has Provided Assistance to Law Enforcement Authorities. The State and Local Anti-Terrorism Training (SLATT) Program, administered by OJP's Bureau of Justice Assistance, provides training and technical assistance on pre-incident preparation and preparedness to state and local law enforcement administrators and prosecution authorities. SLATT works in close cooperation with the FBI's National Security Division Training Unit, delivering specialized executive, investigative, intelligence, and officer safety training.
· May 29, 2002: The FBI Announced Ten Reshaped Priorities Which Focus First on Preventing Terrorist Attacks:
1) Protect the United States from terrorist attack 2) Protect the United States against foreign intelligence operations and espionage 3) Protect the United States against cyber-based attacks and high technology crimes 4) Combat public corruption at all levels 5) Protect civil rights 6) Combat transnational and national criminal organizations and enterprises 7) Combat major white-collar crime 8) Combat significant violent crime 9) Support federal, state, local and international partners 10) Upgrade technology to successfully perform the FBI's mission
· Enhanced Terrorist Surveillance Procedures (USA PATRIOT Act, Title II):
- Adds terrorism crimes to the list of offenses for which wiretap orders are available, also makes wiretap orders available to investigate computer fraud. The wiretap statute authorizes the government to seek a court order to intercept communications relating to a list of enumerated crimes. Previously that list did not include a number of offenses that terrorists are likely to commit. The offenses added under Section 201 include chemical weapons offenses, killing United States nationals abroad, using weapons of mass destruction, and providing material support to terrorist organizations. Section 202 expands the availability of wiretaps to include communications that could reveal evidence of felonious computer fraud. This provision enables law-enforcement personnel to gather information about attacks on computer systems, which sophisticated international terrorist organizations are capable of planning. (Section 201 and 202: Authority to Intercept Wire, Oral, and Electronic Communications Relating to Terrorism)
- Allows law-enforcement personnel to share grand-jury and wiretap information regarding foreign intelligence with various other federal officers without first obtaining a court order, including law-enforcement, intelligence, protective, immigration, national-defense, and national-security personnel. Previous law sharply limited the ability of law-enforcement personnel to share investigative information, and hampered terrorism investigations. Section 203 establishes a general rule that, notwithstanding any other provision of law, federal law-enforcement personnel may share foreign-intelligence information with intelligence, protective, immigration, national-defense, and national-security personnel. The Department has regularly utilized this authority to share information in connection with its terrorism investigation, and the Attorney General is finalizing procedures to institutionalize such cooperation. (Section 203: Authority to Share Criminal Investigative Information)
Authorizes the Director of the FBI to hire translators to support counter-terrorism operations, without regard to federal personnel limitations. The Department regularly utilizes this expanded authority, with great results in improving the efficiency and efficacy of intelligence operations. (Section 205: Employment of Translators by the Federal Bureau of Investigation)
- Improves the ability of law-enforcement officers to enlist the help of third parties, such as landlords, in conducting court-ordered surveillance. Foreign Intelligence Surveillance Act ("FISA") permitted the government to require certain third partiesincluding common carriers, landlords, and custodiansto assist in conducting court-ordered surveillance. However, previous law did not allow law-enforcement personnel to seek the assistance of a third party unless the FISA court has issued an order specifically naming him, which required repeated trips to court, wasting valuable time and resources. Section 206 allows law-enforcement officers to enlist the help of a newly discovered third party by presenting him with a generic court order. This enhances the government's ability to monitor international terrorists and intelligence officers who are trained to thwart surveillance by rapidly changing hotel accommodations, cell phones, and internet accounts, just before important meetings or communications. (Section 206: Roving Surveillance Authority Under the Foreign Intelligence Surveillance Act of 1978)
- Increases the length of surveillance and search orders granted by court. Under previous law, the Foreign Intelligence Surveillance Court could only authorize investigations of foreign powers' employees for up to 45 days. This required law-enforcement personnel to waste valuable time and resources renewing court orders. Section 207 permits the FISA court to authorize physical searches and electronic surveillance of foreign powers' employees for up to 120 days (other persons could be searched / surveilled for 90 days) and further authorizes search / surveillance orders to be extended for periods of up to one year. Section 207 would apply only to foreign nationals. (Section 207: Duration of FISA Surveillance of Non-United States Persons Who Are Agents of a Foreign Power)
- Expedite seizure of voice-mail. Previous law applied different standards to the seizure of unopened emails stored in a computer and unopened voice-mail messages stored with a service provider. The government can obtain unopened emails by obtaining a search warrant, but needed a wiretap order to get unopened voice-mail messages from a service provider. Section 209 treats unopened voice-mail like unopened email, requiring that a search warrant be used. This expedites seizure of voice-mail, and abolishes the current anomalous distinction between voice and data. Section 209 preserves officers' ability under current law to obtain opened messages through a subpoena. (Section 209: Seizure of Voice-Mail Messages Pursuant to Warrants)
- Authorizes investigators to subpoena information about an internet user's "temporarily assigned network address" (the internet equivalent of a telephone number), as well as billing records. Under previous law, the government could issue an administrative subpoena to electronic communications providers that required them to disclose a small class of records, including a customer's name, address, length of service, and long-distance telephone billing records. All other recordsincluding those relating to the internet, which increasingly is terrorists' preferred method of communicatingcould be obtained only through the cumbersome court-order process. In fast-moving terrorist investigations, the delay can be significant. Internet communications often are a critical method of identifying conspirators and determining the source of the attacks. This provision authorizes investigators to subpoena information about an internet user's "temporarily assigned network address," as well as their billing records. Speedy acquisition of this information could identify a perpetrator and link an individual terrorist to a larger organization. Section 210 satisfies a vital law-enforcement need with only a minimal intrusion on privacy interests; it would not allow the government to obtain records of a user's browsing activity. (Section 210: Scope of Subpoenas for Records of Electronic Communications)
- Cable companies subject to the same rules as other internet providers. Many cable companies have begun to provide Internet and telephone service, and some companies have refused to comply with search warrants or subpoenas for records of their customers' telephone and Internet use citing the Cable Act's restrictions. Section 211 clarifies that statutes governing telephone and Internet communications (and not the burdensome provisions of the Cable Act) apply to cable companies that provide Internet or telephone service in addition to television programming. Section 211 clarifies that when a cable company acts as a telephone company or an Internet service provider, it must comply with the same disclosure laws that apply to any other telephone company or Internet service provider. (Section 211: Clarification of Scope)
- Allows communication providers to voluntarily disclose content of subscribers' communications in emergencies that threaten death or serious bodily injury. Previous law did not allow communications providers to disclose the content of their subscribers' communications in emergencies that threaten death or serious bodily injury and even though providers could disclose content to protect their rights and property, they could not in the same circumstances disclose non-content records (such as a subscriber's login records). The law thus prevented communications providers from acting quickly to prevent imminent terrorist or other criminal activity, and hindered their ability to protect themselves from cyber-terrorists and -criminals. This section authorizes a provider to disclose its customers' communications if it believes that an emergency threatens death or serious injury. Immediate disclosure is critical, because there may be no time to obtain process. Section 212 protects customers' privacy interests because it merely allows, rather than requires, providers to disclose communications; the government cannot compel the disclosure of records. Section 212 also clarifies that providers voluntarily may disclose both content and non-content records to protect their computer systems, protecting the infrastructures. In one example, this provision was used to investigate a threat against a high school in Canada, where authorities obtained disclosure information from an internet service provider in the United States and identified the perpetrator, who confessed to the threat. (Section 212: Emergency Disclosure of Electronic Communications to Protect Life and Limb)
- Eases the legal requirements of law-enforcement officials to obtain court permission for pen/trap orders in international terrorism investigations. Previously, FISA authorized pen register / trap and trace orderswhich enable law enforcement to collect non-content information about a communicationin investigations to gather foreign-intelligence information or information about international terrorism. In contrast to the wiretap statute, FISA requires government personnel to certify, not just that the information they seek is relevant, but that the device to be monitored has been used to contact a foreign agent engaged in international terrorism. Under section 214, the government can more easily obtain a pen / trap order in investigations intended to protect against international terrorism or "clandestine intelligence activities." Pen / trap orders would be available if the information to be obtained, or the device to be tapped, is relevant to an international-terrorism investigation. This provision clarifies that the government may not gather information from a United States individual's protected First Amendment activities. (Section 214: Pen Register and Trap and Trace Authority Under FISA)
- Allows law-enforcement officials to more easily obtain business records in international terrorism cases. Previously, FISA made it extremely difficult for law-enforcement personnel to obtain business records in connection with a foreign-intelligence investigation. Section 215 authorized certain law-enforcement personnel to apply to the FISA court for an order requiring the production of any tangible thing. The application must certify that the records are sought as part of an investigation of international terrorism or "clandestine intelligence activities." A United States person cannot be investigated on the basis of First Amendment protected activities. (Section 215: Access to Records and Other Items Under the Foreign Intelligence Surveillance Act)
- Authorizes courts to grant pen/trap orders in relation to the Internet, and makes the order effective anywhere in the United States. Pen registers and trap and trace devices enable law-enforcement personnel to collect non-content information associated with communication. They do not allow officers to eavesdrop on the conversation; they only reveal which numbers are dialed by, or received by, a particular telephone. Law enforcement may use pen registers and trap and trace devices only by obtaining a court order. Under previous law, such orders were valid only in the issuing court's jurisdiction, and it was unclear whether pen registers and trap and trace devices could be used to track internet communications. This provision authorizes courts to grant orders that are valid "anywhere within the United States," ensuring law-enforcement officials no longer have to apply for new orders each time their investigation leads them to another jurisdiction. Section 216 clarifies that the pen/trap provisions apply to facilities other than telephone lines, such as the internet. This enables law enforcement to trace terrorists' communications regardless of the media they use. Law enforcement officials may not eavesdrop on the content of a communication, and this provision does not lower the standard courts use in deciding whether to issue a pen/trap order. The Department has issued guidance clearly delineating departmental policy regarding the avoidance of "overcollection," i.e., the collection of "content" in the use of pen registers or trap and trace devices governed by the statute. (Section 216: Modification of Authorities Relating to Use of Pen Registers and Trap and Trace Devices)
- Allows computer victims of hackers to request government assistance in monitoring and apprehending trespassers. The wiretap statute previously prevented government assistance when victims of computer trespassing request help in monitoring unauthorized attacks. Section 217 allows victims of computer attacks to authorize persons "acting under color of law" to monitor trespassers on their computer systems in a narrow class of cases. Section 217 thus helps place cyber-intruders on the same footing as physical intruders: victims can seek law-enforcement assistance in combating hackers just as burglary victims can invite police officers into their homes to catch burglars. Section 217 does not authorize law-enforcement authorities to intercept the communications of legitimate computer users. (Section 217: Interception of Computer Trespasser Communications)
- Increases availability of searches and surveillance under FISA. Under previous law, law-enforcement personnel who applied for electronic surveillance or physical searches under FISA were required to certify that "the" primary purpose of their investigation was to gather foreign intelligence. This required officers constantly to monitor the relative weight of their investigations' criminal and intelligence purposes. Section 218 clarified that the government may conduct FISA surveillance or searches if foreign-intelligence gathering is "a significant" purpose of the investigation. This change reduces officers' need to evaluate whether their investigations have predominantly criminal or intelligence purposes, and allows increased collaboration between law-enforcement and intelligence personnel. The Department has implemented, and continues to refine, procedures to effectuate this provision. (Section 218: Foreign Intelligence Information)
- Allows law-enforcement officials to obtain a search warrant anywhere a terrorist-related activity occurred. Rule 41(a) of the Federal Rules of Criminal Procedure required law-enforcement personnel to obtain a search warrant in the district where they intend to conduct a search. Terrorism investigations often span a number of districts, and officers therefore must obtain multiple warrants in multiple jurisdictions, creating unnecessary delays. Section 219 provides that warrants can be obtained in any district in which terrorism-related activities occurred, regardless of where they will be executed. This provision does not change the standards governing the availability of a search warrant, but streamlines the search-warrant process. (Section 219: Single-Jurisdiction Search Warrants for Terrorism)
- Allows a court, which has jurisdiction over the offense being investigated, to compel the release of stored communications by issuing a search warrant valid anywhere in the United States. Under previous law, the government had to use a search warrant if it wished to obtain unopened email from a service provider. But a court sitting in one jurisdiction is not able to issue a warrant that is valid in another jurisdiction. This requirement unnecessarily delays officers' access to critical information. Section 220 allows a court, which has jurisdiction over the offense being investigated, to compel the release of stored communications by issuing a search warrant that is valid anywhere in the United States. Section 220 would not dilute the substantive standards governing a search warrant's availability. (Section 220: Nationwide Service of Search Warrants for Electronic Evidence)
- Provides the President with flexibility to impose certain trade sanctions. The previous law prohibited the President from imposing unilateral agricultural and medical sanctions against foreign entities and governments. Section 221 made an exception for sanctions on devices that could be used to develop missiles or other weapons of mass destruction. It also expanded the President's ability to restrict exports to the Taliban, or the portions of Afghanistan controlled by the Taliban. In addition, section 221 of possible terrorist activity.
•November 13, 2001, Attorney General Directive to Designate an Official to Share Information Regarding Terrorist Investigations with State and Local Law Enforcement Officials: Directed each U.S. Attorney to designate a Chief Information Officer (CIO) in order to centralize the process by which information relevant to the investigation and prosecution of terrorists can be shared with state and local officials. In addition, directed each CIO of the district to solicit suggestions from state and local officials on the best way to disseminate information in the district and to establish communications protocols for information sharing.
•November 13, 2001, Attorney General Directive to Makes Counterterrorism Training Available to Local Law Enforcement Participants in the Anti-Terrorism Task Forces: Issued to the Assistant Attorney General for the Office of Justice Programs, the Directors of the Office of Community Oriented Policing Services and the Office of Intergovernmental Affairs, and all United States Attorneys. This directive required training similar to that of the Anti-Terrorism Coordinators be made available to local law enforcement participants in the ATTFs either at the National Advocacy Training Center in Columbia, South Carolina, or through remote training at the 94 United States Attorneys' offices.
•April 11, 2002, Attorney General Directive to Institutionalize Information Sharing Efforts Through Shared Databases: Issued to the Deputy Attorney General, the Assistant Attorneys General for the Criminal Division and the Office of Legal Policy, the Commissioner of INS, the Administrator of the DEA, and the Directors of the FBI, the Executive Office of United States Attorneys, the Marshals Service, and the Foreign Terrorist Tracking Task Force. The directives included expanding terrorist information in law enforcement databases, coordinating foreign terrorist information with the Department of Defense and foreign law enforcement agencies, improving information coordination with state and local partners through the development of a secure but unclassified web-based system, and the standardizing of the procedures for the sharing of foreign intelligence and counterintelligence information obtained as part of a criminal investigation with relevant federal officials.
· Investigative Guidelines: Implemented New Guidelines to Help Conduct Investigations Capable of Preventing Terrorist Attacks. The new guidelines reflect the Attorney General's mission for the Justice Department's war on terror: to neutralize terrorists before they are able to strike. The revised guidelines create new information- and intelligence-gathering authorities to detect terrorist plots, and strengthen existing provisions to promote effective intervention to foil terrorists' plans. Now they are poised for prevention. The Attorney General, on May 30, 2002, released four guidelines, including:
- General Crimes, Racketeering and Terrorism Investigations - FBI Undercover Operations - Confidential Informants - Lawful, Warrantless Monitoring of Verbal Communications
•The Guidelines Allow the FBI to Work to Prevent Crimes, Rather than Just Investigating Past Crimes. The previous guidelines generally barred the FBI from taking the initiative to detect and prevent future crimes, unless it learned of possible criminal activity from external sources. As a result, the FBI was largely confined to a reactive role.
- Authorizing the FBI to Have Normal Public Access to Public Places. Under the old guidelines, FBI field agents were inhibited from visiting public places, which are open to all other citizens. Agents avoided them not because they were barred by the Constitution, or any federal statute, but because of the lack of clear authority under administrative guidelines issued decades ago. The new guidelines clarify that FBI field agents may enter any public place that is open to other citizens, unless they are prohibited from doing so by the Constitution or federal statute, for the specific purpose of detecting or preventing terrorist activities. The guidelines do not, and cannot, nullify any existing Constitutional or statutory duty to obtain judicial approval as required to conduct their surveillance or investigations.
- Enhances Information-Gathering Ability, Allows General Internet Searches and Commercial Research Data. In the past, there was no clear basis for conducting online research for counterterrorism purposeseven of publicly available informationexcept when investigating a specific case. For example, FBI agents could not conduct online searches to identify websites in which bomb-making instructions or plans for cyberterrorism are openly traded and disseminated. The new guidelines strengthen the FBI's intelligence-gathering capabilities by expressly stating that agents may engage in online research, even when not linked to an individual criminal investigation. They also authorize the FBI to use commercial data mining services to detect and prevent terrorist attacks, independent of particular criminal investigations.
- Allows FBI Field Agents to Use Information Collected in the Earliest Stages To Investigate Groups Suspected of Terrorism. Under the old Guidelines, preliminary inquirieswhere agents gather information before enough evidence has been uncovered to merit an outright investigationcould be used only to determine whether there was enough evidence to justify investigating an individual crime. They could not be used to determine whether to open a broader investigation of groups involved in terrorism (i.e., "terrorism enterprise investigations"). The FBI will be able to use preliminary inquiries to determine whether to launch investigations of groups involved in terrorism (i.e., "terrorism enterprise investigations").
- Expanding the Scope and Duration of Investigations, and Easing Red Tape for FBI Field Agents. The previous guidelines impeded the effective use of criminal intelligence investigations (i.e., investigations of criminal enterprises) by imposing limits on the scope of such investigations, short authorization periods, and burdensome approval and renewal requirements. The guidelines now expand the scope of criminal intelligence investigations, lengthen their authorization periods, and ease the approval and renewal requirements. This flexibility enhances the FBI's terrorism-preventing function and helps the agents in the field.
- FBI: $412 million in additional funds as follows: $223 million to increase intelligence and surveillance capabilities, response capabilities, and additional equipment and support personnel; $109 million to enhance various FBI information technology projects, including digital storage of documents, data management and warehousing, collaborative capabilities, IT support for Legal Attaches, continuity of operations, video teleconferencing capabilities, and Trilogy support and mainframe data center upgrades; and $78 million to harden FBI information systems against inappropriate and illegal use and intrusion, and to conduct background investigations. The total proposed FY 2003 budget for the FBI ($4.3 billion) is a 19% increase over FY 2002 ($3.6 billion pre-CT Supplemental). With these increases, the FBI budget has increased by almost one-third over the past two years (29%).
· State and Local Anti-Terrorism Training (SLATT) Program Has Provided Assistance to Law Enforcement Authorities. The State and Local Anti-Terrorism Training (SLATT) Program, administered by OJP's Bureau of Justice Assistance, provides training and technical assistance on pre-incident preparation and preparedness to state and local law enforcement administrators and prosecution authorities. SLATT works in close cooperation with the FBI's National Security Division Training Unit, delivering specialized executive, investigative, intelligence, and officer safety training.
· May 29, 2002: The FBI Announced Ten Reshaped Priorities Which Focus First on Preventing Terrorist Attacks:
1) Protect the United States from terrorist attack 2) Protect the United States against foreign intelligence operations and espionage 3) Protect the United States against cyber-based attacks and high technology crimes 4) Combat public corruption at all levels 5) Protect civil rights 6) Combat transnational and national criminal organizations and enterprises 7) Combat major white-collar crime 8) Combat significant violent crime 9) Support federal, state, local and international partners 10) Upgrade technology to successfully perform the FBI's mission
· Enhanced Terrorist Surveillance Procedures (USA PATRIOT Act, Title II):
- Adds terrorism crimes to the list of offenses for which wiretap orders are available, also makes wiretap orders available to investigate computer fraud. The wiretap statute authorizes the government to seek a court order to intercept communications relating to a list of enumerated crimes. Previously that list did not include a number of offenses that terrorists are likely to commit. The offenses added under Section 201 include chemical weapons offenses, killing United States nationals abroad, using weapons of mass destruction, and providing material support to terrorist organizations. Section 202 expands the availability of wiretaps to include communications that could reveal evidence of felonious computer fraud. This provision enables law-enforcement personnel to gather information about attacks on computer systems, which sophisticated international terrorist organizations are capable of planning. (Section 201 and 202: Authority to Intercept Wire, Oral, and Electronic Communications Relating to Terrorism)
- Allows law-enforcement personnel to share grand-jury and wiretap information regarding foreign intelligence with various other federal officers without first obtaining a court order, including law-enforcement, intelligence, protective, immigration, national-defense, and national-security personnel. Previous law sharply limited the ability of law-enforcement personnel to share investigative information, and hampered terrorism investigations. Section 203 establishes a general rule that, notwithstanding any other provision of law, federal law-enforcement personnel may share foreign-intelligence information with intelligence, protective, immigration, national-defense, and national-security personnel. The Department has regularly utilized this authority to share information in connection with its terrorism investigation, and the Attorney General is finalizing procedures to institutionalize such cooperation. (Section 203: Authority to Share Criminal Investigative Information)
Authorizes the Director of the FBI to hire translators to support counter-terrorism operations, without regard to federal personnel limitations. The Department regularly utilizes this expanded authority, with great results in improving the efficiency and efficacy of intelligence operations. (Section 205: Employment of Translators by the Federal Bureau of Investigation)
- Improves the ability of law-enforcement officers to enlist the help of third parties, such as landlords, in conducting court-ordered surveillance. Foreign Intelligence Surveillance Act ("FISA") permitted the government to require certain third partiesincluding common carriers, landlords, and custodiansto assist in conducting court-ordered surveillance. However, previous law did not allow law-enforcement personnel to seek the assistance of a third party unless the FISA court has issued an order specifically naming him, which required repeated trips to court, wasting valuable time and resources. Section 206 allows law-enforcement officers to enlist the help of a newly discovered third party by presenting him with a generic court order. This enhances the government's ability to monitor international terrorists and intelligence officers who are trained to thwart surveillance by rapidly changing hotel accommodations, cell phones, and internet accounts, just before important meetings or communications. (Section 206: Roving Surveillance Authority Under the Foreign Intelligence Surveillance Act of 1978)
- Increases the length of surveillance and search orders granted by court. Under previous law, the Foreign Intelligence Surveillance Court could only authorize investigations of foreign powers' employees for up to 45 days. This required law-enforcement personnel to waste valuable time and resources renewing court orders. Section 207 permits the FISA court to authorize physical searches and electronic surveillance of foreign powers' employees for up to 120 days (other persons could be searched / surveilled for 90 days) and further authorizes search / surveillance orders to be extended for periods of up to one year. Section 207 would apply only to foreign nationals. (Section 207: Duration of FISA Surveillance of Non-United States Persons Who Are Agents of a Foreign Power)
- Expedite seizure of voice-mail. Previous law applied different standards to the seizure of unopened emails stored in a computer and unopened voice-mail messages stored with a service provider. The government can obtain unopened emails by obtaining a search warrant, but needed a wiretap order to get unopened voice-mail messages from a service provider. Section 209 treats unopened voice-mail like unopened email, requiring that a search warrant be used. This expedites seizure of voice-mail, and abolishes the current anomalous distinction between voice and data. Section 209 preserves officers' ability under current law to obtain opened messages through a subpoena. (Section 209: Seizure of Voice-Mail Messages Pursuant to Warrants)
- Authorizes investigators to subpoena information about an internet user's "temporarily assigned network address" (the internet equivalent of a telephone number), as well as billing records. Under previous law, the government could issue an administrative subpoena to electronic communications providers that required them to disclose a small class of records, including a customer's name, address, length of service, and long-distance telephone billing records. All other recordsincluding those relating to the internet, which increasingly is terrorists' preferred method of communicatingcould be obtained only through the cumbersome court-order process. In fast-moving terrorist investigations, the delay can be significant. Internet communications often are a critical method of identifying conspirators and determining the source of the attacks. This provision authorizes investigators to subpoena information about an internet user's "temporarily assigned network address," as well as their billing records. Speedy acquisition of this information could identify a perpetrator and link an individual terrorist to a larger organization. Section 210 satisfies a vital law-enforcement need with only a minimal intrusion on privacy interests; it would not allow the government to obtain records of a user's browsing activity. (Section 210: Scope of Subpoenas for Records of Electronic Communications)
- Cable companies subject to the same rules as other internet providers. Many cable companies have begun to provide Internet and telephone service, and some companies have refused to comply with search warrants or subpoenas for records of their customers' telephone and Internet use citing the Cable Act's restrictions. Section 211 clarifies that statutes governing telephone and Internet communications (and not the burdensome provisions of the Cable Act) apply to cable companies that provide Internet or telephone service in addition to television programming. Section 211 clarifies that when a cable company acts as a telephone company or an Internet service provider, it must comply with the same disclosure laws that apply to any other telephone company or Internet service provider. (Section 211: Clarification of Scope)
- Allows communication providers to voluntarily disclose content of subscribers' communications in emergencies that threaten death or serious bodily injury. Previous law did not allow communications providers to disclose the content of their subscribers' communications in emergencies that threaten death or serious bodily injury and even though providers could disclose content to protect their rights and property, they could not in the same circumstances disclose non-content records (such as a subscriber's login records). The law thus prevented communications providers from acting quickly to prevent imminent terrorist or other criminal activity, and hindered their ability to protect themselves from cyber-terrorists and -criminals. This section authorizes a provider to disclose its customers' communications if it believes that an emergency threatens death or serious injury. Immediate disclosure is critical, because there may be no time to obtain process. Section 212 protects customers' privacy interests because it merely allows, rather than requires, providers to disclose communications; the government cannot compel the disclosure of records. Section 212 also clarifies that providers voluntarily may disclose both content and non-content records to protect their computer systems, protecting the infrastructures. In one example, this provision was used to investigate a threat against a high school in Canada, where authorities obtained disclosure information from an internet service provider in the United States and identified the perpetrator, who confessed to the threat. (Section 212: Emergency Disclosure of Electronic Communications to Protect Life and Limb)
- Eases the legal requirements of law-enforcement officials to obtain court permission for pen/trap orders in international terrorism investigations. Previously, FISA authorized pen register / trap and trace orderswhich enable law enforcement to collect non-content information about a communicationin investigations to gather foreign-intelligence information or information about international terrorism. In contrast to the wiretap statute, FISA requires government personnel to certify, not just that the information they seek is relevant, but that the device to be monitored has been used to contact a foreign agent engaged in international terrorism. Under section 214, the government can more easily obtain a pen / trap order in investigations intended to protect against international terrorism or "clandestine intelligence activities." Pen / trap orders would be available if the information to be obtained, or the device to be tapped, is relevant to an international-terrorism investigation. This provision clarifies that the government may not gather information from a United States individual's protected First Amendment activities. (Section 214: Pen Register and Trap and Trace Authority Under FISA)
- Allows law-enforcement officials to more easily obtain business records in international terrorism cases. Previously, FISA made it extremely difficult for law-enforcement personnel to obtain business records in connection with a foreign-intelligence investigation. Section 215 authorized certain law-enforcement personnel to apply to the FISA court for an order requiring the production of any tangible thing. The application must certify that the records are sought as part of an investigation of international terrorism or "clandestine intelligence activities." A United States person cannot be investigated on the basis of First Amendment protected activities. (Section 215: Access to Records and Other Items Under the Foreign Intelligence Surveillance Act)
- Authorizes courts to grant pen/trap orders in relation to the Internet, and makes the order effective anywhere in the United States. Pen registers and trap and trace devices enable law-enforcement personnel to collect non-content information associated with communication. They do not allow officers to eavesdrop on the conversation; they only reveal which numbers are dialed by, or received by, a particular telephone. Law enforcement may use pen registers and trap and trace devices only by obtaining a court order. Under previous law, such orders were valid only in the issuing court's jurisdiction, and it was unclear whether pen registers and trap and trace devices could be used to track internet communications. This provision authorizes courts to grant orders that are valid "anywhere within the United States," ensuring law-enforcement officials no longer have to apply for new orders each time their investigation leads them to another jurisdiction. Section 216 clarifies that the pen/trap provisions apply to facilities other than telephone lines, such as the internet. This enables law enforcement to trace terrorists' communications regardless of the media they use. Law enforcement officials may not eavesdrop on the content of a communication, and this provision does not lower the standard courts use in deciding whether to issue a pen/trap order. The Department has issued guidance clearly delineating departmental policy regarding the avoidance of "overcollection," i.e., the collection of "content" in the use of pen registers or trap and trace devices governed by the statute. (Section 216: Modification of Authorities Relating to Use of Pen Registers and Trap and Trace Devices)
- Allows computer victims of hackers to request government assistance in monitoring and apprehending trespassers. The wiretap statute previously prevented government assistance when victims of computer trespassing request help in monitoring unauthorized attacks. Section 217 allows victims of computer attacks to authorize persons "acting under color of law" to monitor trespassers on their computer systems in a narrow class of cases. Section 217 thus helps place cyber-intruders on the same footing as physical intruders: victims can seek law-enforcement assistance in combating hackers just as burglary victims can invite police officers into their homes to catch burglars. Section 217 does not authorize law-enforcement authorities to intercept the communications of legitimate computer users. (Section 217: Interception of Computer Trespasser Communications)
- Increases availability of searches and surveillance under FISA. Under previous law, law-enforcement personnel who applied for electronic surveillance or physical searches under FISA were required to certify that "the" primary purpose of their investigation was to gather foreign intelligence. This required officers constantly to monitor the relative weight of their investigations' criminal and intelligence purposes. Section 218 clarified that the government may conduct FISA surveillance or searches if foreign-intelligence gathering is "a significant" purpose of the investigation. This change reduces officers' need to evaluate whether their investigations have predominantly criminal or intelligence purposes, and allows increased collaboration between law-enforcement and intelligence personnel. The Department has implemented, and continues to refine, procedures to effectuate this provision. (Section 218: Foreign Intelligence Information)
- Allows law-enforcement officials to obtain a search warrant anywhere a terrorist-related activity occurred. Rule 41(a) of the Federal Rules of Criminal Procedure required law-enforcement personnel to obtain a search warrant in the district where they intend to conduct a search. Terrorism investigations often span a number of districts, and officers therefore must obtain multiple warrants in multiple jurisdictions, creating unnecessary delays. Section 219 provides that warrants can be obtained in any district in which terrorism-related activities occurred, regardless of where they will be executed. This provision does not change the standards governing the availability of a search warrant, but streamlines the search-warrant process. (Section 219: Single-Jurisdiction Search Warrants for Terrorism)
- Allows a court, which has jurisdiction over the offense being investigated, to compel the release of stored communications by issuing a search warrant valid anywhere in the United States. Under previous law, the government had to use a search warrant if it wished to obtain unopened email from a service provider. But a court sitting in one jurisdiction is not able to issue a warrant that is valid in another jurisdiction. This requirement unnecessarily delays officers' access to critical information. Section 220 allows a court, which has jurisdiction over the offense being investigated, to compel the release of stored communications by issuing a search warrant that is valid anywhere in the United States. Section 220 would not dilute the substantive standards governing a search warrant's availability. (Section 220: Nationwide Service of Search Warrants for Electronic Evidence)
- Provides the President with flexibility to impose certain trade sanctions. The previous law prohibited the President from imposing unilateral agricultural and medical sanctions against foreign entities and governments. Section 221 made an exception for sanctions on devices that could be used to develop missiles or other weapons of mass destruction. It also expanded the President's ability to restrict exports to the Taliban, or the portions of Afghanistan controlled by the Taliban. In addition, section 221 of possible terrorist activity.
•November 13, 2001, Attorney General Directive to Designate an Official to Share Information Regarding Terrorist Investigations with State and Local Law Enforcement Officials: Directed each U.S. Attorney to designate a Chief Information Officer (CIO) in order to centralize the process by which information relevant to the investigation and prosecution of terrorists can be shared with state and local officials. In addition, directed each CIO of the district to solicit suggestions from state and local officials on the best way to disseminate information in the district and to establish communications protocols for information sharing.
•November 13, 2001, Attorney General Directive to Makes Counterterrorism Training Available to Local Law Enforcement Participants in the Anti-Terrorism Task Forces: Issued to the Assistant Attorney General for the Office of Justice Programs, the Directors of the Office of Community Oriented Policing Services and the Office of Intergovernmental Affairs, and all United States Attorneys. This directive required training similar to that of the Anti-Terrorism Coordinators be made available to local law enforcement participants in the ATTFs either at the National Advocacy Training Center in Columbia, South Carolina, or through remote training at the 94 United States Attorneys' offices.
•April 11, 2002, Attorney General Directive to Institutionalize Information Sharing Efforts Through Shared Databases: Issued to the Deputy Attorney General, the Assistant Attorneys General for the Criminal Division and the Office of Legal Policy, the Commissioner of INS, the Administrator of the DEA, and the Directors of the FBI, the Executive Office of United States Attorneys, the Marshals Service, and the Foreign Terrorist Tracking Task Force. The directives included expanding terrorist information in law enforcement databases, coordinating foreign terrorist information with the Department of Defense and foreign law enforcement agencies, improving information coordination with state and local partners through the development of a secure but unclassified web-based system, and the standardizing of the procedures for the sharing of foreign intelligence and counterintelligence information obtained as part of a criminal investigation with relevant federal officials.
· Investigative Guidelines: Implemented New Guidelines to Help Conduct Investigations Capable of Preventing Terrorist Attacks. The new guidelines reflect the Attorney General's mission for the Justice Department's war on terror: to neutralize terrorists before they are able to strike. The revised guidelines create new information- and intelligence-gathering authorities to detect terrorist plots, and strengthen existing provisions to promote effective intervention to foil terrorists' plans. Now they are poised for prevention. The Attorney General, on May 30, 2002, released four guidelines, including:
- General Crimes, Racketeering and Terrorism Investigations - FBI Undercover Operations - Confidential Informants - Lawful, Warrantless Monitoring of Verbal Communications
•The Guidelines Allow the FBI to Work to Prevent Crimes, Rather than Just Investigating Past Crimes. The previous guidelines generally barred the FBI from taking the initiative to detect and prevent future crimes, unless it learned of possible criminal activity from external sources. As a result, the FBI was largely confined to a reactive role.
- Authorizing the FBI to Have Normal Public Access to Public Places. Under the old guidelines, FBI field agents were inhibited from visiting public places, which are open to all other citizens. Agents avoided them not because they were barred by the Constitution, or any federal statute, but because of the lack of clear authority under administrative guidelines issued decades ago. The new guidelines clarify that FBI field agents may enter any public place that is open to other citizens, unless they are prohibited from doing so by the Constitution or federal statute, for the specific purpose of detecting or preventing terrorist activities. The guidelines do not, and cannot, nullify any existing Constitutional or statutory duty to obtain judicial approval as required to conduct their surveillance or investigations.
- Enhances Information-Gathering Ability, Allows General Internet Searches and Commercial Research Data. In the past, there was no clear basis for conducting online research for counterterrorism purposeseven of publicly available informationexcept when investigating a specific case. For example, FBI agents could not conduct online searches to identify websites in which bomb-making instructions or plans for cyberterrorism are openly traded and disseminated. The new guidelines strengthen the FBI's intelligence-gathering capabilities by expressly stating that agents may engage in online research, even when not linked to an individual criminal investigation. They also authorize the FBI to use commercial data mining services to detect and prevent terrorist attacks, independent of particular criminal investigations.
- Allows FBI Field Agents to Use Information Collected in the Earliest Stages To Investigate Groups Suspected of Terrorism. Under the old Guidelines, preliminary inquirieswhere agents gather information before enough evidence has been uncovered to merit an outright investigationcould be used only to determine whether there was enough evidence to justify investigating an individual crime. They could not be used to determine whether to open a broader investigation of groups involved in terrorism (i.e., "terrorism enterprise investigations"). The FBI will be able to use preliminary inquiries to determine whether to launch investigations of groups involved in terrorism (i.e., "terrorism enterprise investigations").
- Expanding the Scope and Duration of Investigations, and Easing Red Tape for FBI Field Agents. The previous guidelines impeded the effective use of criminal intelligence investigations (i.e., investigations of criminal enterprises) by imposing limits on the scope of such investigations, short authorization periods, and burdensome approval and renewal requirements. The guidelines now expand the scope of criminal intelligence investigations, lengthen their authorization periods, and ease the approval and renewal requirements. This flexibility enhances the FBI's terrorism-preventing function and helps the agents in the field.
We are 100% volunteer and depend on your participation to sustain our efforts!
Get Involved
If you'd like to help with maintaining or developing the website, contact us.
Publish
Publish your stories and upcoming events on Indybay.
Topics
More
Search Indybay's Archives
Advanced Search
►
▼
IMC Network
The only way to deal with trolls is to limit your reaction to reminding others not to respond to trolls.
Pull the lever, chimp.
Now pull the lever.
Bart: "Listen to yourself, man: you're hangin' with nerds."
Homer: "You take that back!"
Marge: "Homer, please! These boys sound very nice, but they're clearly nerds."
Homer: "Really? But nerds are my mortal enemy!"
Lisa: "Dad, nerds are nothing to fear. In fact, they've done some pretty memorable things. Some nerds of note include... popcorn magnate Orville Redenbacher, rock star David Byrne, and Supreme Court justice David Souter."
Homer: (gasp) "Oh, not Souter! Oh, no!!"
this big
by grefft • Wednesday September 11, 2002 at 02:44 AM
Homer: "We played trolls online for three hours! Then I got disconnected."
Bart: "Listen to yourself, man: you're hangin' with nerds."
Homer: "You take that back!"
Marge: "Homer, please! These boys sound very nice, but they're clearly nerds."
Homer: "Really? But nerds are my mortal enemy!"
Lisa: "Dad, nerds are nothing to fear. In fact, they've done some pretty memorable things. Some nerds of note include... popcorn magnate Orville Redenbacher, rock star David Byrne, and Supreme Court justice David Souter."
Homer: (gasp) "Oh, not Souter! Oh, no!!"
Grefft Lewis
by me • Wednesday September 11, 2002 at 02:49 AM
How can you possibly top that? It's the absolute troll killinest joke ever. What a comeback. Youre the king.
So, is "greffft" the sound when your butt buddy pulls out?
.....
by grefft • Wednesday September 11, 2002 at 02:50 AM
you already told that joke, geekboy. It sucks. Deal with it.
Go play some Dungeons and Dragons or something
Pull the lever, lardass Greenpeace starve the blackies chimp.
This place is already being investigated. Carnivore tracks every post and logs every IP. So if SmushForBrains ever actually makes good on any of his death threats, there is a ton of evidence that can be obtained by subpoena and used to establish both motive and premeditation when he is eventually brought to trial for first degree murder. Later, after the verdict is in, he can go spend the rest of his life being some con’s punk.
If he’s lucky, one of nessie’s friends will get to him first.
•••
Typical example:
http://www.indybay.org/news/2002/09/147457_comment.php#147670
It's going to be between you and me. We're going to end up having to kill you pieces of shit because you keep backing our enemies. Sometimes I think death is what you really want, though.
You either choose America or fucking die with your muslim friends.
serious shit is going down. If you help the enemy and put me in harms way then I WILL fucking kill you. It's you or me,
It's time to go to war. I've had enough of you
No jury in America would convict smash. All he'd have to do is show them the articles of how the liberals spend their time on here cussing America, burning flags on July 4th, supporting pedophiles and NAMBLA, threating the government and the citizenry of this great Nation. It would be justifiable homocide. You haven't got a fucking case, and what's more, you know it.
I guarantee if I ever see or hear about sf indymedia or any of it's participants being on trial for anything, I'm going to be there. I'm going to make sure the jusdge and jury knows everything I know. I'm going to make sure the executioner carries out his duties. I want to cast the first stone. I want to push the putton. I hope they let me pull the switch.
As far as the banner goes, yep, we're being brainwashed. Those planes didn't really bring the towers down. And if they did, well, it was a government conspiracy to control the masses. We weren't really under attack that day. That's just what they want us to believe so they can control us.
Liberals really are a lot of laughs.
couple points though:
No kidding, nobody "likes" war, but in a world of evil, it's needed to fight against those that would destroy freedom. Sure, maybe someday we can burn our weapons and hold hands, but even then some alien could attack us with a board-n-nail and we would be defenseless (ala The Simpsons). But untill that day will come, the US and other civilized nations need nukes and F-16s to defend itself. Also, the majority of Americans want to see Saddam unseated from power.
The resistance to overthrowing dictatorships truly is amazing sometimes. Moral relativism, both feet firmly planted mid-air.
And finally, the amount of "debate" that goes on here is pathetic. We have name-calling and lots of cursing, but little substance on either side. I've seen more civilized debate on a Quake gaming forum.
Gosh you sound just like the shrub - so who decides what's evil, and what isn't? The devil? Jesus is lord? Walt Disney?
Have you decided who the real axis of evil is yet? Or are you going with the shrub version? What version is it today, by the way? It seems to get bigger and bigger, doesn't it?
Are you "really" for the downtrodden and repressed, or do you just like to hear yourself babble?
I don't want to hear about any shit of how we are repressed, and Bush sent the planes into the towers. If our leaders are that evil, people like you would long ago have been rounded up and tortured, so Hussein could watch and masturbate to another video.
We are full of shit. We are obvious hypocrites that really just have a simple political agenda. You mean you haven't figured it out yet? Ok here, let me spill the beans for you.
In America, we have what we like to call a two party system. That means you are either a Republican or a Democrat, Conservative or Liberal, Right or Left. See, we have all of these ideals that place us on the EXTREME left. We're anarchists, socialists and communists. But since none of those parties have any chance of succeeding in America, or goal is simple. We want to get as many people elected that we can that have political perspectives as close to ours as possible.
You will not find any of these people on the right, that is for sure. So the bottom line is:
We here at SF IMC, are solely about getting Democrats elected to office.
Plain and simple. That's pretty much it. If we have to slander and lie, cheat and steal, vandalize and kill to exacerbate the situation as much as possible to get Democrats elected, then so be it.
It's a simple political agenda.
Democrats in office.
Now you know.
And all this time you've been calling us crazy.
Or am I confused as to the point you were making (which is none).
My point is simple liberals are the source of 90% of what is wrong with America. Everything else is hunky-dory. If we could just get rid of you guys....
Wrong, I HATE ALL YOU FUCKERS.
- NeoLiberals
- NeoCons
- Assholes
- Trolls
Yes, there are a lot of screwed up people here, but what you don't understand is that you are one of them.
In short all stupid twats who would willingly burn the Constitution to save America.
You don't see me posting stuff you like, gosh too fucking bad little girl, I'M NOT HERE TO MAKE YOU HAPPY.
Now go and cry in your mother's lap...
Here:
1600 Pennsylvania Avenue NW
Washington, DC 20500
Now, don't you feel better? Come on over for a visit and bring your friends. Just tell the guy at the door that W. said it was ok for you to come over and play.
Why the fuck don't you post yours?
BTW: Nice assumption, so if I go trolling the Freeper boards you'll be happy?
How do you know I'm not already?
Assume: Making an ass out of yourself in one fell swoop.
Yes. Go. Run and cry to YOUR mothers lap.
Chickenshit liberals.
Like I said, I have to WORK to make my money...
Poor whiners, can't get anyone to stay and listen to their abuse....poor, poor children.
Nessie: Uh, Mr. FBI, Someone has threatened our lives.
FBI: wah wah wah wah
Nessie: Yes, I know I've said that we should take rulers and murder them by throwing them off a cliff.
FBI: wah wah wah
Nessie: Yes, I've said that we should all committ murder by burning the rich in their houses with them in it.
FBI: wah wah wah wah wah
Nessie: Well, yes, I have written articles on the internet where I admit to starting and participating in riots that included my own involvement in vandalism and resulted in loss of life by law enforcement officers.
FBI: wah wah wah
Nessie: I am a life-long anarchist who despises our government and have repeateadly called for protesters to resist, harm and/or kill law enforcement officers given the opportunity.
FBI: wah wah wah wah wha wah wah wah
Nessie: What do you mean you have evidence I have threatened myself by writing in another name just to make me appear like a big shot?
FBI: Wah Wah
Nessie: What do you mean 'Go Away!?'
Here help me tape up my ginney-pig so it doesn't
explode when I butt-rape it like "me" or "smash the
left" did. What a mess. Where did you put that duct tape?
by Sheepdog • Friday September 13, 2002 at 11:56 AM
Hey forget about fucking kids, that's out of style.
"Out of style" That wasn't a bit funny, you traitorous NAMBLA slime. But what do we expect from nessie's Siamese twin, joined at the sphincter?
you? Are you still sore? Try some prep H and take
a nap.
Raping your mother while I was ranting
from the communist manafesto must have
affected your personality. Sorry.
Someone seems _awfully_ concerned about their future health and well-being or lack thereof.