Judge Upholds FBI Keyboard Sniffing 285
mshiltonj writes: "Wired is reporting that keyboard sniffing can be used to catch "mobsters." I feel safer already. You can read the ruling. Here's a snippet: "This case presents an interesting issue of first impression dealing with the ever-present tension between individual privacy and liberty rights and law enforcement's use of new and advanced technology to vigorously investigate criminal activity. It appears that no district court in the country has addressed a similar issue. Of course, the matter takes on added importance in light of recent events and potential national security implications." Translation: Don't deny us this tool or you'll be blamed for us not catching terrorists." See also an Infoworld article. We have several previous stories on the Scarfo case.
I'm glad to see... (Score:2, Funny)
If I remember correctly, J Edgar Hoover was the FBI's original keyboard sniffer.
how do we protect ourselves? (Score:3, Interesting)
what solutions are there? as for software, i've seen one site about free-ware antivirus, but it was linux only (like linux needs av software!). it would be nice if there was open-source AV for windows. any pointers?
as for hardware, other than having intimate knowledge of your own hardware (always checking your keyboard cable connection and keeping your chassis open for inspection), i can only think of sealed, tamper proof computer chassis.
Re:how do we protect ourselves? (Score:2)
The author, David Coursey, has been hit and miss with his articles, but when he gets it right, he's pretty good.
Re:how do we protect ourselves? (Score:3, Insightful)
Re:how do we protect ourselves? (Score:3, Interesting)
Now we've caused the need for video loggers.
Re:how do we protect ourselves? (Score:3, Informative)
Let me clarify: there has been quite a bit of press about NAV and McAfee supporting the FBI backdoor, that is: letting the fed's virus slip by undetected. The reason why I asked about freeware should be obvious at this point.
Now back to my oh so tasty Ramen...
Re:how do we protect ourselves? (Score:3, Funny)
Re:how do we protect ourselves? (Score:2)
Why?
I don't mind commercial software, and I would pay much more than $30 for a good antivirus program, but the fact is, McAfee is bloated and ethically challenged, kind of like the operating sytems it runs on.
Norton isn't much better.
An Antivirus program should be small. It should take up little memory and only be as big as is needed to do the work. It's functions should be non-obtrusive and every function should be optional. It should not have compulsory splash screens or animations, or sounds, or any other "glitz" to make it look more like a multimedia extravaganza than a utility.
I used to recommend Innoculate IT Personal until it went commercial, and even still I recommend it for those willing to pay.
Now I recommend AVG, from http://www.grisoft.com [grisoft.com] It's fairly small, it's free for personal home use, and it's effective.
As for the FBI Spyware crap -- I don't know if AVG reports it or not, but at least if it doesn't, it's not like you PAID money only to be betrayed, which is something I can't say about McAfee.
Important point (Score:3)
I don't see anything wrong with the police searching, or spying on, someone if they first get a warrant.
Re:Important point (Score:2)
If they're already granted rights like this, then I suppose the keyboard bug isn't much different.
Yes, they can (Score:3, Redundant)
Re:Important point (Score:2)
Re:Important point (Score:3, Interesting)
That's all nice and good, but just to clarify, you quoted text about the FBI being armed with a "court order" as opposed to a "search warrant". It's my understanding that a search warrant has a higher standard of justification that must be met before a judge may issue it.
They had a court approval, but... (Score:2)
It definitely bothers me.
Re:They had a court approval, but... (Score:4, Insightful)
Re:They had a court approval, but... (Score:2)
Re:They had a court approval, but... (Score:2)
Really? If an agent runs an intercept without court authorization, they are personally liable for civil damages for running an illegal wiretap. If you know of this happening, you should contact your local US Attorney's office. For more information, check out 18 USC 2520 [cornell.edu], which says, in part, "any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter may in a civil action recover from the person or entity which engaged in that violation such relief as may be appropriate" and then goes on to spell out civil penalties of "the sum of the actual damages suffered by the plaintiff and any profits made by the violator as a result of the violation; or statutory damages of whichever is the greater of $100 a day for each day of violation or $10,000."
Re:They had a court approval, but... (Score:2)
Does anyone have any stats or stories about law enforcement people being busted under this? I'm not being argumentative -- believe it or not -- but it'd be handy to see if this sort of legal protection is actually effective.
Re:They had a court approval, but... (Score:2)
Re:They had a court approval, but... (Score:2)
What you describe at the former Soviet Embassy would not require a court order. The Embassy is Soviet land, and is not subject to the laws of the United States. Hence, the US didnt need a court order to plant a camera in a copy machine at an Embassy, just the authorization from officals at the CIA. Now if the "repair man" was caught by Soviet officials -- he would be tried for espionage in Moscow.
The court order the FBI had is only needed when dealing within the US, regardless of the investigatee's nationality.
Linux Support? (Score:2)
-Pete
Hardware keystroke sniffer (Score:2)
I've actually seen similar products for sale at $99 in consumer electronics catalogs as a way to catch your kids surfing porn.
While I have not (yet) seen equivalent products for USB on the market, sniffing USB is even easier than PS/2.
Re:Hardware keystroke sniffer (Score:3, Insightful)
I'm sorry, I just get annoyed when people say things about which they have no idea. What part of sniffing USB is easier? The hardware would be much more complex. You have to identify which frames belong to the keyboard and not the printer, scanner, mouse etc. if you are using a hub. There's a lot more information to process and if you want to process it later, then you have to store a lot more. I don't see how it's any easier, actually its harder. PS/2 on the other hand is a very simple protocol, very simple hardware can process it.
If you were perhaps talking about the software level, you still have to hook into the keyboard drivers, the USB or PS/2 stuff is abstracted to the keyboard driver, so on that level they are about the same degree of difficulty. And actually, sniffing linux is pretty easy too, I'm sure the FBI could do it, granted they would have to recompile the kernel since the keyboard stuff is usually not a module, but very do-able...
Installation (Score:5, Interesting)
Also, if the sniffer is sent as a trojan'd email or program, could this lead to entrapment defenses based on the enticement used in the delivery method?
Re:Installation (Score:3, Interesting)
In the Magic Lantern system, they propose either hacking into the machine from the Internet, or more likely, install a transparent proxy at the ISP that attaches a trojan to any .exe the user downloads from the Internet.
Re:Installation (Score:2)
1) The court order authorized them to use "intrusive methods" to place the device.
2) As I understand entrapment, the action the defendant has been enticed into has to be (or lead to) what they are being charged for.
Re:Installation (Score:3, Interesting)
The fact is that perfect authorities who are "untouchable" and never err will never exist in the world due to the fact that they are products of an imperfect society. Do we expect all people everywhere to be never wrong in their judgement of others? Then how can we expect the few that we give power to to be any better than the collective world that they come from?
Of course, this could be seen as the beginnings of an anarchistic rant, but just understand, the key is in oversight and accountability, not constant cleansing of the people we entrust with the application of our rights.
lawyer: really a procedural question (Score:2)
>It is important for law enforcement to have the
>tools at their disposal to be able to properly
>investigate crime and gather evidence.
yes, but this is largely a procedural issue. THere *was* judicial oversight, and there definitely *will be* judicial oversight.
The question is as to the *form* the oversight should take. A very simple look over the shoulder, such a as a warrant, or the higher standard we use with a more intrusive wiretap. In *some* way there will be judicial approval. the question is how.
hawk
System Security (Score:3, Insightful)
Here are some excellent step-by-step instructions on securing Linux [enteract.com], Solaris [enteract.com], and NT [enteract.com].
Re:System Security (Score:2)
If these holes have been plugged, they'll need physical access which then requires (I hope!) a warrant.
Re:Then the answer is don't use your keyboard (Score:2)
I don't see what all the fuss is about (Score:3, Funny)
Active and passive wiretapping (Score:5, Insightful)
The real danger here lies in how wiretapping is shifting from being an activity you need to actively monitor via an external resource, and is becoming a self-contained object you drop into the suspect's house and fetch later. The latter you only need a court order. The former you need a full warrant.
Until a judge figures out that loggers and tappers are basically the same thing with two different methods of planting and unplanting, this ruling will stick, unfortunately. And once voice recorders are small enough to be plantable devices without any active collection needed (or video recorders, or combination video and audio and keystroke and data packet sniffer and so on) then little black boxes can sneak into anyone's home on thin suspicion.
Re:Active and passive wiretapping (Score:2)
In one sense, it is. Not that a keyboard sniffer is a wiretap, but that it is held to the same standard before being granted. I think it's perfectly legitimate to search for analogies to the procedure in question. In effect, the defense is saying, "This is as worrisome and intrusive as a wiretap, with similar potentials for abuse, and therefore should be restricted in the same way." Since the wiretap law exists, has lots of case law, strikes a workable balance, and is familiar, why not piggyback on it?
Of course the defense is proposing something that will lead to their winning. That doesn't make their argument invalid or their reasoning bad.
Watch for an increase of sales in (Score:2, Interesting)
Bugs are Easier (Score:2)
Of course, the trick is not to plant the bug, the trick is to plant the bug in such a way that your intrusion is not discovered. I suspect that the brighter folks in the criminal world will be focussing on detecting such intrusions more than they will be focussing on preventing them.
Making the details known to the populace (Score:5, Insightful)
While police are not the military, they are still providing for that common defense. Why should anything be reserved to a government agency, and kep away from the people at alarge? Isn't this a government of the people, by the people, for the people? A lifetime membership oin the public beauraucracy [sorry for my spelling] is a frightening thing.
I'm starting to think the ancient Athenians had it right.
Public service there was should be involuntary, random , and short.
I am a former Military officer, so no need to tell me about military secrets and stuff like that. Far more of our offensive ability comes from our advanced manufacturing power than scientific advances on the US has. I've served my time, and have now returned to the (server) farm.
The 4th Amendment is alive and well (Score:4, Informative)
Re:The 4th Amendment is alive and well (Score:2)
Re:The 4th Amendment is alive and well (Score:2)
This is the same as wiretapping (Score:4, Insightful)
bb
Re:This is the same as wiretapping (Score:2)
dudes, (Score:2, Funny)
Proper procedures were followed (Score:5, Informative)
"Acting pursuant to federal search warrants, the F.B.I. on January 15, 1999, entered Scarfo and Paolercio's business office, Merchant Services of Essex County, to search for evidence of an illegal gambling and loansharking operation. During their search of Merchant Services, the F.B.I. came across a personal computer and attempted to access its various files. They were unable to gain entry to an encrypted file named ?Factors.?
Suspecting the ?Factors? file contained evidence of an illegal gambling and loansharking operation, the F.B.I. returned to the location and, pursuant to two search warrants, installed what is known as a ?Key Logger System? (?KLS?) on the computer and/or computer keyboard in order to decipher the passphrase to the encrypted file, thereby gaining entry to the file."
Note that the FBI has a warrent for the first entry, and returned with new warrents to install the KLS. I'm as paranoid as the next guy about government intrusion (hence my Libertynews.org [libertynews.org] website) but the FBI followed the rules here. And as detailed in previous articles they actually bent over backwards to make sure the KLS did not record any of his online keystrokes.
This is the kind of thing that civil libertarians should be applauding, proper use of warrents and use of technology to limit the scope of thier intrusion.
Re:Proper procedures were followed (Score:2)
Re:Proper procedures were followed (Score:3, Interesting)
Wiretap warrants require more probable cause, because they will capture _everything_, not just the particular conversation the cops are after. So, instead of getting a wiretap warrant, they got a warrant to go after the encryption key and configured the KLS to discard keystrokes when the modem was active, therefore it didn't catch any keystrokes that were being _directly_ transmitted.
That's highly Jesuitical reasoning. Quite obviously if Scarpo typed e-mail off-line, then dialed in to send it, the KLS would capture that. Sounds like a wiretap to me. More to the principle of the laws, KLS captures everything typed in whenever the modem is off, not just the item specified in the warrant.
Note that although the FBI insisted and finally convinced the judge that the KLS system was "secret" and so the court and Scarfo's lawyers could only see an edited version of the specs, they did let out how to beat it. Keep that modem running! (Wouldn't an ethernet connection also do this? It's continually active on an external cable, and so under their definition of "wiretapping" KLS would have to stay off.)
To me, it looks like the courts are going nuts over tiny technical details, which they hardly understand, while missing the big picture. The FBI has lied and concealed evidence about Waco, protected one of their agents who turned out to be spying for many years (Hansen), and at least one field office (Boston organized crime task force) has become difficult to distinguish from the mobsters. And it's pretty clear by now that if anyone is ever disciplined for Waco, it will be a letter of reprimand sent to their retirement home, and I have no reason to expect any significant firings over the other misdeeds, let alone agents going to jail. Yet, the judge will take the FBI's word for it that the KLS has to be secret and the sanitized description released is sufficiently accurate.
If I could trust the cops to obey the laws and their procedures, I wouldn't worry much about technicalities...
Secret. Heh. (Score:2)
Re:Secret. Heh. (Score:2)
Of course they can, like Cosmo [imdb.com].
Do they really think...? (Score:2, Interesting)
First off, how many people are NOT running Lookout Distress or similar Gatesian Bloatware for their E-mail? Those who fall into this category WILL see the 'Magic Lantern' worm as an unexecuted file attachment, one that is likely to be quickly deleted.
Second: How long is it going to take the computing community "At Large" to dissect how ML or any other keyboard logger works, and come up with a very effective countermeasure?
Third: How long will it take seasoned criminals to grab said countermeasure? The ones that are computer-savvy can download and install just as well as any techie.
This whole exercise seems to be little more than useless window dressing to me. It almost looks like a (somewhat desperate) attempt by the FBI to fool the public into thinking they're effectively fighting terrorists when they may not have the slightest hint of a clue.
I don't pretend to have all the answers, but I really don't see what good monitoring Lord only knows how many computer keyboards will do. And how is a typical consumer, who can barely find their system's power switch, going to know if they're being monitored?
Re:Do they really think...? (Score:2)
Third: How long will it take seasoned criminals to grab said countermeasure? The ones that are computer-savvy can download and install just as well as any techie.
No, smart criminals will not remove this, they will sabatoge it. That is it will still be there, and appear to function correctly, except it will only log legal activity. (ie posts to /., irc sessions, email to mom.) The things that you don't want known won't be loged.
Re:Do they really think...? (Score:2)
(Assuming we're talking about the software loggers...)
At first, I thought FBI probably has a good thing going. It's not like this thing is a virus. Only the suspect's computer will be compromised, so it might take a long time for the security community to get a copy of FBI's malware. And they can't look at it, if they can't get their hands on it.
Except... someone who "practices unsafe computing" enough to be vulnerable to FBI software attacks, is vulnerable to other attacks as well(*). So the next year's Sircam will eventually mass-mail the FBI software out to everyone in some suspected criminal's MS Outlook address book. "Don Corleone, I include this file for your advice..."
(*) That's the whole problem with FBI's attitude that they must have a way to gather evidence this way. If FBI even has the capability (warrant or not) to do this, then computers are vulnerable to criminal attacks as well. A world where the cops require that everyone leave their front door unlocked, is Burglar Paradise.
Key points (Score:5, Informative)
In order to combat this, the FBI designed their keylogger to go innactive while the modem was connected. I still have some lingering questions about this. E-mail is asynchronous. With many e-mail services (Eudora, Outlook, and AOL), the underlying software lets you compose e-mail offline and store it to disk, automatically transferring it at a later date. Personally, I compose a lot of my e-mail when my computer is offline -- these days, I spend half my time on airplanes, it is when I get the most e-mail written, I sync when I land at the next destination.
Another worrisome trend is that the hearings were "ex parte in camera" -- meaning in the judges private chambers without the presence of defense attornies. The FBI claims the details must remain a secret for national security reasons. The defense attornies are only provided a sanitized summary of the keylogging features, not the full details. This is worrisome because it prevents the public from understanding the details of what is really going on. As we saw in the Carnivore case, the FBI was free to define its own boundaries. For example, when Carnivore grabs e-mail summaries, I would interpret the court order as allowing capture of only the SMTP "envelope" containing the TO/FROM addresses -- the FBI interprets this as capturing the full e-mail headers. I think this is a gross violation of civil liberties, but there is no way to challenge this. Likewise, the keylogger details may show similar gross violations of civil liberties, but the FBI hides behind its cloak of "national security".
The thing is, there are no important details to keylogging. You can go to http://www.keyghost.com for your own hardware-based keylogger, or you can download numerous keyloggers off the Internet. There are some difficult problems. For example, PGP 6.0 introduced a keyboard driver that intercepts your keystrokes: when you type your password, this driver routes them around Windows. Thus, while it appears that you are typing in a dialog box, this is only an illusion. Standard software keyloggers for Windows will not capture the passwords. (This is why PGP 6 doesn't work well with Win2k -- it doesn't have the power management features, so it prevents Win2k from going into "suspend/hibernate" mode).
Anyway, I'll be posting some more detailed analysis later this month on my personal website. In addition, I'm providing a $10,000 bounty for anybody PC containing an "interesting" keylogger -- maybe one from the mafia doing industrial espionage, maybe one from the FBI, I don't care. I'll be posting the full details to my website (http://www.robertgraham.com [robertgraham.com]).
reasoning more disturbing than the details (Score:2)
Isn't some kind of bizare expectation of privacy [google.com] principle at work here as well? That so many people are denying such a thing for all things internet is very disturbing and in sharp contrast to laws for now obsolete communications methods, phone and post. How the bastards decide that the government can look into my private communications without reason is much less important than the fact that they will do so. The fourth amendment is going away.
What's to keep them from putting cameras into your house? That have worked just as well to get the passwords.
Re:Key points (Score:2)
An interesting point, but remember that only the actual communication itself is protected under the wiretap statute, 18 USC 2518. That is, the actual bits you sent as e-mail are protected by this law. Any drafts or other documents you make on your computer are protected as stored communications, which are discussed in 18 USC 2703, also called the Electronic Communications Privacy Act.
Re:Key points (Score:2)
I found that out the hard way, and the buggers made the upgrade to the power-management-friendly version (7.x) a paid upgrade. It did include a bit of new functionality (the ability to create self-decrypting archives), though.
Re:Key points (Score:2)
This is a Double Edged Sword... (Score:3, Insightful)
Don't get me wrong, I'm not one of the types that thinks everytime the government makes a new law or whatever that it is a bad thing. I simply feel that privacy is one of our most sacred freedoms.
If the government taps me accidentally instead of their intended target, and they discover me doing something that violates a law in a minor way, they are going to pursue getting a warrant so that they can use the information legitimately next time it happens. Point is they didn't have the right to tap me in the first place.
Second point is this. If I get tapped by accident (net-criminal spoofed my IP/connection details) and a third party hacker (i'm simplifying this.. i know i'll catch heat for using hacker)intercepts the signal, he may learn of information that puts me, my career, or my life in danger.. information that would not have leaked had it not been for the government adding a hole to my system. I doubt the government would compensate me if I lost my job for leaking trusted information to the web.
I'm all for anything that aids our law-enforcement officials, as long as they are responsible and take ownership of the consequences.
Making it mandatory for the government to notify you that you are being snooped defeats the purpose of the monitoring in the first place. A more suitable method would be allow concerned individuals email or call to request whether or not they are being snooped. Then if they ARE snooping you, and they have reason, they can ask you to see a local court to discuss the matter without actually stating that they ARE monitoring you. That is one faster way of getting the criminals into court, if they are foolish enough. It also protects the innocent. Of course if the government is 'accidentally' snooping you, they will just tell you "no, we aren't monitoring you" because they think they are monitoring the person spoofing your connection.
A better solution is a time-passworded utility that you can install and call to request the current password. The utility would check your system for the trojan. If that is the case, I'm all for this course of action against cyber-crime.
-fc
.
Don't you watch Law and Order? (Score:2)
Well, in that case, the charges they bring against you will be dropped (assuming your lawyer is decent) because of exactly what you said: they didn't have the right to tap you in the first place. Then you can sue them for your time.
Evasion Tool (Score:2)
The only problem after that is evading the "looking over your shoulder" that no-echo keyboard password prompts are so good at avoiding. Maybe a very low contrast virtual keyboard and cursor...
Re:Evasion Tool (Score:2)
If your computer has been turned against you then there is no hope of using it protect your secrets.
Re:Evasion Tool (Score:2)
How to avoid keyloggers (Score:5, Funny)
Can a logger be detected or stopped? (Score:2)
Beyond this, are there ways of making the operating system itself immune to keylogging? In windows this might be a custom keyboard driver. In Linux perhaps a kernel module.
No matter what you do they can always log at the hardware level (essentially bug your keyboard), but it'd be nice to make it as hard as possible for them.
-josh
Quantum Keyboards (Score:3, Interesting)
There is a theoretical solution to this, using quantum diodes and open source software it is possible to create an untapable system. The quantum diodes would be part of an optical based keyboard. When any photons are prematurely observed, the whole thing errors out.
The nature of open source software would make it difficult to add flaws that couldn't be detected if wanted. In fact, the encription program could do MD5 sums on the kernel and all parts of the OS that grap keystrokes making that impossible too.
Other ways like a video grab of the keyboard, or biometrics on the individual typing could be done too. But I think the simplest way would be with a smart card that had a mini ATM keyboard on it. The user would keep it in his wallet at all times, and key in a pin before using it - too many guesses would permanently disable it.
Good for crypto (Score:3, Insightful)
I actually think the Scarfo case is a good thing. The logger was used in accordance with a court order, and the whole thing gives lie to the argument that we can't have readily available crypto because it makes the actual bad guys invulnerable to law enforcement.
In future news... (Score:2)
Zorch released a statement two weeks ago saying that he was not interested in licensing his invention to the United States government at any cost.
Neither friends nor family have heard from Zorch for the past two weeks. His whereabouts are unknown.
What I fear (Score:2)
What the government fears the people there is freedom. When the people fear the government there is tyrrany. Guess which scenario we live in?
Lee
Sniffing Passwords vs. Sniffing File Contents (Score:2)
There's a difference between the Feds sniffing the passphrase, which is indirect evidence, and sniffing the contents of the file as he typed it, which would have been more direct evidence had they done that. The Feds are trying to hide how they stole the passphrase, and they're arguing about exactly what kind of warrant is needed for stealing it (wiretap vs. search warrant), but once they've stolen the passphrase and legally obtained the encrypted file, they can use it to show a jury that the passphrase they stole decrypts the file into the text they're alleging that Scarfo typed which allegedly shows that he's a mobster. And if they'd simply guessed the passphrase (hint, don't use simple words or your father's prison ID # as your passphrase) they could have done the same. By contrast, if they'd used the SEEKRIT keyboardsniffer to snarf up the file itself, they'd have to tell the jury "Nicky really typed this incriminating letter, trust us, we can't tell you how we know that, cuz it's RILLY SEEKRIT, but we're the FBI and we'd never lie to you, so he's GUILTY GUILTY GUILTY", they'd have a much weaker case. (Any self-respecting jury would throw them out on their expletive-deleted for even trying that, but American juries often fall for that sort of thing, and judges fall for it even more often.)
US rules of evidence, since the early-1960s Supreme Court decisions which promulgated the "Exclusionary Rule", say that you can't use illegally obtained evidence, and there's a doctrine called "Fruit of the Poisoned Tree" which says that if you illegally obtain information that you use to obtain other information, you can't use that as evidence either. So if they'd beaten or tortured the information out of Scarfo, or if they hadn't had a warrant when they first searched his computer, they'd be unable to use it legally, which is part of why Scarfo's lawyers were arguing about the precise type of warrant they needed before stealing his passphrase.
On the other hand, if they'd gone asking around the mobster social club if anybody wanted to call in an anonymous tip with Nicky's usual passwords or offering get-out-of-jail-free cards to temporarily-retired mobsters in return for the passphrase, that'd be legal, and unlike the cases where stool pigeons give false testimony about people in return for reduced jail time, a passphrase is demonstrably either correct or incorrect. (And of course, an "anonymous tip" is often nearly indistinguishable from illegally gathered evidence used to obtain a search warrant.)
Re:Am I missing something? (Score:2)
This ruling means that they don't need to get a warant to sniff, just a court order.
So it's not rampant abuse of the system, but the privacy people see it as the thin end of a wedge.
Re:Am I missing something? (Score:2)
This ruling means that they don't need to get a warant to sniff, just a court order.
I believe the two are synonymous. You have to go to a judge to get a warrent to perform any kind of search or seizure. I don't believe that this lowers the legal standard.
Re:Am I missing something? (Score:5, Informative)
Previously, the FBI had to get a wiretap order, under Title III, which has to be signed by the Attorney General or the Deputy. In this case, the FBI was able to gather their evidence using only a search warrant, which any judge can issue.
The FBI's argument was that because the device only intercepted intra-computer communication (i.e. from the keyboard to the CPU) and not computer to computer communications, those communications are not protected by the Wiretap statute (18 USC 2518 [cornell.edu]).
Re:Am I missing something? (Score:4, Interesting)
Which is kinda like saying they can put a bug directly in your phone, because then it's only recording what's going from your mouth to the microphone, not phone to phone, and thus not a wiretap.
Granted, in a computer not all keystrokes are going to be transfered over the network, but how can you, the observing FBI agent, know which are which until you look at all of them? I can't see how you could possibly avoid looking at information (like a typed email) that should be require a wiretap order.
But then again, I'm too jaded and cynical to work up much anger when the FBI makes a grab for a little more power. One day my children will wake up and find themselves in a police state where you are born free until an officer of the law says otherwise, and no one will be able to understand how it happened because they won't notice that it has.
Re:Am I missing something? (Score:2)
The FBI's tool took very careful steps to not record anything when the user was on-line. It checked whether the modem was in use, Internet Explorer was running, and a few other details. (That information comes from the EPIC [epic.org] web site, sorry I don't have a better link.)
I agree that you could argue that the user was typing an e-mail in Notepad that was going to become a communication, but the typing in Notepad is not, in an of itself, a communication. The actual e-mail leaving the system is a communication only.
Re:Am I missing something? (Score:2)
I'd say that, by definition, an e-mail is a communication whether or not it has been sent yet. Being e-mail implies the intent to communicate it, otherwise it's just a document. Given that, and the fact that they couldn't distinquish an email from anything else, I'd say a wiretap order should still be necessary.
Re:Am I missing something? (Score:2)
Re:Am I missing something? (Score:2)
Whether this is what the law says or not really doesn't matter to whether or not it's true.
Re:Am I missing something? (Score:3, Interesting)
Active communications (e.g. e-mail in transit) are protected by 18 USC 2518. Stored communications that you're talking about, such as e-mails you've received, chat logs, and the like, are protected under 18 USC 2703 [cornell.edu]. The rules regarding these protections, also sometimes called the Electronic Communications Privacy Act (ECPA) are rather complicated and depend greatly on the type of information, how old it is, and where it's being stored.
The differences active and stored communications can be summed up this way: To intercept an active communication, the government must show probable cause that the interception will yield evidence of a crime. If a federal judge agrees, he will grant a wiretap order, or authority. To obtain stored communications (e.g. connection logs, billing records, stored e-mail, etc.), the government must present probable cause to a judge, who can grant either a search warrant or a court order (also called a 2703 order). The type of records being obtained determines whether a court order or search warrant is issued.
Re:Am I missing something? (Score:2)
From a strict legal perspective the fact that the keyboard logger *could* record communications that the warrent didn't cover isn't really a reason no to use the device. If the device did record any such communication, the communication and anything resulting from it's interception would not be admissable as evidence.
Re:Am I missing something? (Score:2)
From a strict legal perspective, the issue has already been solved, by the judge, barring any issues that come up in appeals. What I'm saying is that I for me, the principle I believe in is that the -could- is what matters, not the promise not to.
Plus, it's a lot tougher to have to prove in court that certain bits of evidence are inadmissible because they were obtained from communications vs non-communications captured from the keyboard rather than just saying you can't capture without a wiretap in the first place.
Re:Am I missing something? (Score:2)
Yes, they can pick up phone conversations while bugging the room. But! In order to get the authority to monitor the room, the government has to show probable cause that monitoring the communications in the room will give evidence of a crime. They can't say, "We'll be able to listen to the guy on the phone," becuase the judge will bitch slap them and say, "ask for a wiretap!" They have to show that people will be in the room talking and they they're trying to monitor that.
If such a legal monitor happens to pick up other audio information not origingally intended, but that is evidence, it is admissible. The same way that if any member of law enforcement is in a legal position and observes evidence of a crime, it's admissible. (Example: Guy calls the cops to say his TV was stolen. While the cops are in the guys house with him writing out a report, they notice a ten pound bag of crack on the table.)
(BTW, this is first really intelligible discussion I've been able to have on
Re:Am I missing something? (Score:2)
Re:Am I missing something? (Score:2)
Not that I'd trust the FBI to kindly not capture keystrokes when I'm typing in Eudora, thanks. They -can- be capturing communication after installing this device, so they should have to get judicial approval to do so.
Re:Am I missing something? (Score:2)
I would say this is more closely analogous to getting the key to a locked file cabinet than to monitoring communications. As such, I would agree, the wiretap statute shouldn't apply.
It is like getting the key to a locked file cabinet, but to do so they tapped the guy's phone and waited for him to divulge where he hid the key. Wouldn't you need a wiretap order to do that?
The problem here is that, again, they can't tell if he's typing an email or his password until they see the keystrokes, but they record it anyway. If he was using that computer for e-mail, then there's really no way they couldn't have gotten those emails as well as the password.
Inevitably, they are recording communications, and as such I feel they should need a wiretap order. I can't see any fault with this principle.
Re:Am I missing something? (Score:2, Interesting)
Finally an excuse to use my old Amiga!
The amiga keyboard uses a 6502 processor to communicate to the main cpu - a 68000.
That's computer-to-computer communication, and therefore protected by the Wiretap statute. Right? ;^)
Re:Am I missing something? (Score:2, Funny)
Well, at least that means "Fuck you, spammer" is protected by the First Amendment... ;-)
Re:Am I missing something? (Score:2)
Re:we need separate phone lines (Score:3, Funny)
Re:we need separate phone lines (Score:2)
Contractor: Hey, boss. I hit some sort of electrical cable at two feet.
Foreman: Was it flagged?
Contractor: Uhhh... no. All the flags for telco, electric and cable are over there. *Points*
Foreman: Keep digging.
Seriously, if this sort of thing could even take off, it will be via wireless connections.
Re:Keyboard sniffing, anthrax, and the media (Score:2)
Re:Antivirus Ignoring FBI Keyloggers (Score:2)
http://www.usatoday.com/life/cyber/tech/2001/12/1
Re:been said before and will be said again (Score:2, Insightful)
You cannot walk around yelling "freedom at any cost!", because freedom is just part of the balance that makes our society what it is.
You obviously cannot give everyone all the freedoms in the world just because our culture tells us that freedom is all important. It has a place in society, like justice, restraint and safety.
If you truely believed that you cannot sacrifice ANY freedoms for safety; freedom to own tanks, freedom to spray bullets at Dubaya, freedom to fart in other peoples food, I think it would ROCK! But thats not the point. Society would end as we know it.
As for sayings, recognise this one?
A person's individual freedom to swing his arm extends only so far as the next person's nose.
It is for all of us as a collective society to determine where the next persons nose is.
So, even as importand as freedoms are (and BTW, I disagree with the Judges decision, too much freedoms are at risk, but thats IMHO), we can not go ballying around (HA! I just said ballying!) claiming that freedoms are the end all in everything.
There can always be too much of something, no matter how good it is.
Re:Terrorism is the new excuse (Score:3, Insightful)
They've set up military tribunals,
These are explicitly for non-US citizens caught abroad, trying to attack the US. US citizens aren't subject to them (they've got constitutional rights). Residents of the US aren't subject to them (the Supreme Court says that non-citizens who are residents of the US have constitutional rights). Stop being an idiot.
email/keyboard sniffing
This case was explicitly about a mafioso, so how is the terrorist excuse working here? Besides, WIRETAPS ARE LEGAL WITH A JUDGE'S PERMISSION. This is just the 21st century version of the wiretap. Stop being an idiot.
, hundreds of detnetions,
And every single detainee is either someone who has violated the law (overstaying their visas, for example) or who is a material witness who is likely to flee. Unless you know better, oh stupid one? This is the exact same thing that liberal icon Bobby Kennedy did when he started taking on the mob; if a reputed mafioso spit on the sidewalk, he would be arrested for violating public spitting laws (which exist to prevent the spread of disease). Was it OK for Bobby Kennedy to do? Did civilization collapse?
racial profiling
Note to moron: you would have to be willfully stupid to not wonder about a muslim booking a one-way ticket on a jumbo jet, taking no baggage. Idiots don't pay attention to patterns just because it's not politically correct. Oh, and the majority of American Blacks are in favor of racial profiling to prevent terror attacks, so you can assuage your white, upper-middle class guilt.
under this "terrorism" excuse.
Excuse? If you think this is a fucking excuse, please tell me where the Twin Towers went. Do you think they're on holiday in Paris?
Russia says the Chechyns are "terrorists."
The Chechens are terrorists. They blew up several apartment buildings in Russia two or three years ago. That's what prompted the renewal of the Chechen war. There had been a cease-fire for about a year until they started blowing up civilians in Russia. Sorry to let actual facts get in the way of your mindless diatribe.
China's calling Taiwan "terrorist,"
China is run by a group of evil people. They've been calling the Taiwanese whatever name seems to strike a nerve in the West. It's like Saddam calling the US/British no-fly zones "terrorist" or "criminal." When the evil ones call you names, you're doing well.
-jon
Re:Terrorism is the new excuse (Score:2)
" These are explicitly for non-US citizens caught abroad, trying to attack the US. US citizens aren't subject to them (they've got constitutional rights). Residents of the US aren't subject to them (the Supreme Court says that non-citizens who are residents of the US have constitutional rights). Stop being an idiot."
What are you talking about?! American lives are worth more than Afghan lives?! (or for that matter, Somalian, Ethiopian, Pakistani, Iraqi, etc?). Who the F cares if US citizens aren't subject to them. This is a total invasion of the human rights of the Afghanees.
You know these tribunals are exactly what the Soviet Union used during the Cold War. Read up on it. Americans haven't been exposed to this sort of thing, so they're not as sensetive to it.
Re:Terrorism is the new excuse (Score:2)
Who the F cares if US citizens aren't subject to them. This is a total invasion of the human rights of the Afghanees.
It is no such thing. Let me try to explain this to someone as terminally stupid as yourself. Military tribunals are intended to try prisoners of war, captured overseas. Same as the Nuremberg trials, same as the trial faced by Tojo and other Japanese leaders at the end of WW II.
This is a war. The US is bending over backwards to be nice to captured enemy troops, even though these troops are fighting in violation of the Third Geneva Convention (they target civilians, they don't wear uniforms to mark themselves as combatants, and they don't reveal their chain of command). Under international law, the US is well within its rights to shoot these fuckers with no trial at all.
Human rights, by the way, are a fiction created by western societies. If you don't respect them (as the Taliban and Al Qeida certainly don't), they don't exist. Pissing and moaning that the US isn't respecting rights that the the people captured don't even believe exist is an amazing exercise in self-indulgence.
You know these tribunals are exactly what the Soviet Union used during the Cold War. Read up on it. Americans haven't been exposed to this sort of thing, so they're not as sensetive to it.
Oh don't be absurd. This is nothing like the show trials in the USSR. Please site an example (with references) that show any similarities. You're just another America-hater who would love to cast the US as the Evil Empire, since the country you loved (the USSR) proved to be so completely rotten.
-jon
Re:Terrorism is the new excuse (Score:2)
Stop making things up. These tribunals are 100% secret. You/other civilians have no idea what is going on there.
With on the spot convictions/death penalty, god knows how many innocent people will be sentenced by these kill happy folks.
Re:Scary, but honestly... (Score:2)
But who cares about guns? Just follow your state fireamrs laws and you're OK. No one spies on you because you're weird. Only if you're a suspect in criminal activity.
Re:Keylogger (Score:2)
Re:Evidence in Plain View (Score:2)
Re:Alternatively ... (Score:2)
If you call, they'll show up.
Granted, our police officers are probably underpaid for the work they do - but I have no inclination to give any of them donations either.
I've already done so, indirectly, by paying for a couple of exhorbitantly expensive speeding tickets.
(In fact, I paid a lawyer to get them reduced to plain old parking tickets, but the "court costs" alone were close to $200 for each of them. Obviously, they're making plenty of money off of their traffic courts.)
Re:What's with this surveilence-phobia? (Score:2)
And there we have it, ladies and gentlemen -- the exact sentiment that will help destroy justice and the rule of law.
We worry about too much surveillance because it empowers law enforcement far beyond what it needs. The surveillance society cannot be free, because every person must worry at every moment that he/she is under surveillance. What's more, as law enforcement rushes to make more of the citizenry's actions public through surveillance, law enforcement also demands that more of its own actions be made secret -- thereby undermining the public oversight that is the fundament of American liberty.
If we could count on the police to only use this when needed and justified, well, then we wouldn't need excessive brutality laws, Miranda rights, or any of the other trappings of a civil society.
I am not against law enforcement -- my family is deep in law enforcement -- but I am against unaccountable law enforcement. I am against intrusive law enforcement. I am against law enforcement that sees every citizen as merely a crook who hasn't been caught yet.
There are good cops, there are good DAs, there are good judges. You know what? They play by the rules and they welcome the active oversight of an informed public. When one of the anniversaries of Miranda rolled around, a news organization interviewed a bunch of tough law enforcment types to see what impact the decision had had... how many criminals had walked on "technicalities". You know what? Most of the cops said, the Miranda process strengthened law enforcement, because it marked clear boundaries and built civic trust in the justice process.
It is not a choice between liberties and law. The two can coexist... people are just too lazy to see how.