Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
EFF: Surveillance

EFF: Surveillance

Ratings: (0)|Views: 18|Likes:
Published by EFF

More info:

Published by: EFF on Jan 28, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as TXT, PDF, TXT or read online from Scribd
See more
See less

06/14/2009

pdf

text

original

 
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"><head><title>EFF: </title><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><link rel="stylesheet" type="text/css"href="http://www.eff.org/sites/all/themes/frontier/style.css"><link rel="stylesheet" type="text/css"href="http://w2.eff.org/stylesheets/www2.css"><link rel="stylesheet"href="http://www.eff.org/sites/all/themes/frontier/800.css" type="text/css"media="screen" id="narrow" title="narrow" /><link rel="alternate stylesheet"href="http://www.eff.org/sites/all/themes/frontier/1015.css" type="text/css"media="screen" id="wide" title="wide" /><script src="http://www.eff.org/sites/all/themes/frontier/resizey.js"type="text/javascript"></script><link rel="alternate" type="application/rss+xml" title="EFF - Deeplinks"href="http://www.eff.org/rss/blog" /><link rel="alternate" type="application/rss+xml" title="EFF - Press Releases"href="http://www.eff.org/rss/pressrelease" /><link rel="alternate" type="application/rss+xml" title="EFF - Action Alerts"href="http://action.eff.org/feed/rss2_0/alerts.rss" /><link rel="shortcut icon" type="image/x-icon" href="/favicon.ico" /><script type="text/javascript"><!--window.onresize =doOnResize;window.onload = doOnLoad;//--></script></head><body><div class="wrapper"><div id="header"><div id="headerinner"><div id="search"><div id="searchinner"><form method="get" action="/cgi/search-proxy.py"><input class="searchtextarea" type="text" name="q" size="15" maxlength="255"value="Enter search terms" onclick="this.value = ''" /> <input type="submit"class="submit" value="Search EFF" name="sa" /> <a class="searchinfolink"href="/policy#search">?</a></form></div></div><a id="logo" href="/"><imgsrc="http://robin.eff.org/sites/all/themes/frontier/images/head_logo.png"alt="Electronic Frontier Foundation" width="442" height="66" border="0" /></a></div></div></div><div id="topnav"><div class="wrapper"><ul class="links-menu"><li><a href="http://www.eff.org/about" class=" first">About</a></li>
 
<li><a href="http://www.eff.org/work">Our Work</a></li><li><a href="http://www.eff.org/deeplinks">Deeplinks Blog</a></li><li><a href="http://www.eff.org/press">Press Room</a></li><li><a href="http://action.eff.org/">Take Action</a></li><li><a href="http://secure.eff.org/" class=" last">Join EFF</a></li></ul></div></div><div class="wrapper"><div id="content" class="withoutsidebar"><div class="breadcrumb"><a href="http://www.eff.org/">Home</a> &raquo; <a href="/Privacy/">Privacy</a>&raquo; <a href="/Privacy/Surveillance/">Surveillance</a><spanclass="crumbspacer">&nbsp;</span></div></div><!-- conditional navbars --><div class="clr"></div> <div id="featuretext"><pre>From denning@cs.cosc.georgetown.eduDate: Tue, 28 Sep 1993 09:54:48 -0400 (EDT)WIRETAP LAWS AND PROCEDURESWHAT HAPPENS WHEN THE U.S. GOVERNMENT TAPS A LINEDonald P. Delaney, Senior InvestigatorNew York State PoliceDorothy E. Denning, Professor and ChairComputer Science Department, Georgetown UniversityJohn Kaye, County ProsecutorMonmouth County, New JerseyAlan R. McDonald, Special Assistant to the Assistant DirectorTechnical Services Division, Federal Bureau of InvestigationSeptember 23, 1993 1. IntroductionAlthough wiretaps are generally illegal in the United States, thefederal government and the governments of thirty seven states have beenauthorized through federal and state legislation to intercept wire andelectronic communications under certain stringent rules which includeobtaining a court order. These rules have been designed to ensure theprotection of individual privacy and Fourth Amendment rights, whilepermitting the use of wiretaps for investigations of serious criminalactivity and for foreign intelligence.
 
This article describes the legal requirements for governmentinterceptions of wire and electronic communications and some of theadditional procedures and practices followed by federal and stateagencies. The legal requirements are rooted in two pieces of federallegislation: the Omnibus Crime Control and Safe Streets Act (Title IIIof the Act (hereafter "Title III")), passed in 1968, and the ForeignIntelligence Surveillance Act (FISA), passed in 1978. Title IIIestablished the basic law for federal and state law enforcementinterceptions performed for the purpose of criminal investigations,while FISA established the law for federal-level interceptionsperformed for intelligence and counterintelligence operations. We willfirst describe Title III interceptions and then describe FISAinterceptions.2. Title III InterceptionsTitle III, as amended (particularly by the Electronic CommunicationsPrivacy Act of 1986), is codified at Title 18 USC, Sections 2510-2521.These statutes provide privacy protection for and govern theinterception of oral, wire, and electronic communications. Title IIIcovers all telephone communications regardless of the medium, exceptthat it does not cover the radio portion of a cordless telephonecommunication that is transmitted between the handset and base unit.The law authorizes the interception of oral, wire, and electroniccommunications by investigative and law enforcement officers conductingcriminal investigations pertaining to serious criminal offenses, i.e.,felonies, following the issuance of a court order by a judge. TheTitle III law authorizes the interception of particular criminalcommunications related to particular criminal offenses. In short, itauthorizes the acquisition of evidence of crime. It does not authorizenoncriminal intelligence gathering, nor does it authorize interceptionsrelated to social or political views.Thirty seven states have statutes permitting interceptions by state andlocal law enforcement officers for certain types of criminalinvestigations. All of the state statutes are based upon Title IIIfrom which they are derivative. These statutes must be at least asrestrictive as Title III, and in fact most are more restrictive intheir requirements. In describing the legal requirements, we willfocus on those of Title III since they define the baseline for allwiretaps performed by federal, state, and local law enforcementagencies.In recent years, state statutes have been modified to keep pace withrapid technological advances in telecommunications. For example, NewJersey amended its electronic surveillance statute in 1993 to includecellular telephones, cordless telephones, digital display beepers, faxtransmissions, computer-to-computer communications, and traces obtainedthrough "caller-ID".Wiretaps are limited to the crimes specified in Title III and statestatutes. In New Jersey, the list includes murder, kidnapping,gambling, robbery, bribery, aggravated assault, wrongful creditpractices, terrorist threats, arson, burglary, felony thefts, escape,forgery, narcotics trafficking, firearms trafficking, racketeering, andorganized crime.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->