-Caveat Lector- http://www.msnbc.com/news/889923.asp?0si=&cp1=1
U.S. steps up secret surveillance FBI, Justice Dept. increase use of wiretaps, records searches By Dan Eggen and Robert O'Harrow Jr. THE WASHINGTON POST WASHINGTON, March 24 — Since the Sept. 11, 2001, attacks, the Justice Department and FBI have dramatically increased the use of two little- known powers that allow authorities to tap telephones, seize bank and telephone records and obtain other information in counterterrorism investigations with no immediate court oversight, according to officials and newly disclosed documents. THE FBI, for example, has issued scores of “national security letters” that require businesses to turn over electronic records about finances, telephone calls, e-mail and other personal information, according to officials and documents. The letters, a type of administrative subpoena, may be issued independently by FBI field offices and are not subject to judicial review unless a case comes to court, officials said. Attorney General John D. Ashcroft has also personally signed more than 170 “emergency foreign intelligence warrants,” three times the number authorized in the preceding 23 years, according to recent congressional testimony. Federal law allows the attorney general to issue unilaterally these classified warrants for wiretaps and physical searches of suspected terrorists and other national security threats under certain circumstances. They can be enforced for 72 hours before they are subject to review and approval by the ultra-secret Foreign Intelligence Surveillance Court. Government officials describe both measures as crucial tools in the war on terrorism that allow authorities to act rapidly in the pursuit of potential threats without the delays that can result from seeking a judge’s signature. Authorities also stress that the tactics are perfectly legal. SOME GROUPS TROUBLED BY TACTICS But some civil liberties and privacy advocates say they are troubled by the increasing use of the tactics, primarily because there is little or no oversight by courts or other outside parties. In both cases, the target of the investigation never has to be informed that the government has obtained his personal records or put him under surveillance. “When this kind of • Homeland security - special section • National security power is used in the regular criminal justice system, there are some built- in checks and balances,” said David Sobel, general counsel of the Electronic Privacy Information Center (EPIC), which is suing the Justice Department for information about its secretive anti-terrorism strategies. “The intelligence context provides no such protection. That’s the main problem with these kinds of secretive procedures.” The use of national security letters has been accelerated in part because Congress made it easier to use and apply them. The USA Patriot Act, a package of sweeping anti-terrorism legislation passed after the Sept. 11 attacks, loosened the standard for targeting individuals by national security letters and allowed FBI field offices, rather than a senior official at headquarters, to issue them, officials said. The records that can be obtained through the letters include telephone logs, e-mail logs, certain financial and bank records and credit reports, a Justice official said. The Patriot Act also significantly increased the amount of intelligence information that can be shared with criminal prosecutors and federal grand juries, giving authorities new powers in the war on terrorism. National security letters can be used as part of criminal investigations and preliminary inquiries involving terrorism and espionage, according to officials and internal FBI guidelines on the letters. FIVE PAGES OF LOGS According to documents given to EPIC and the American Civil Liberties Union as part of their lawsuit, the FBI has issued enough national security letters since October 2001 to fill more than five pages of logs. There is no way to determine exactly how many times the documents have been employed because the logs were almost entirely blacked out, according to a copy provided to The Washington Post by the ACLU. The Justice Department and FBI refuse to provide summary data about how often the letters are used. Several lawmakers have proposed legislation that would require the department to provide that kind of data. “In our view, the public is entitled to these statistics,” said Jameel Jaffer, staff attorney for the ACLU’s national legal department. “We have no idea how those are being used.” FBI spokesman John Iannarelli said “it’s safe to say that anybody who is going to conduct a terrorism investigation is probably going to use them at some point. ... It’s a way to expedite information, and there’s nothing that needs expediting more than a terrorism investigation.” But a November 2001 memorandum prepared by FBI attorneys warned that the letters “must be used judiciously” to avoid angering Congress, which will reconsider Patriot provisions in 2005. “The greater availability of NSLs does not mean they should be used in every case,” the memo says. Beryl A. Howell, former general counsel to Sen. Patrick Leahy (D-Vt.) and a specialist in surveillance law, described national security letters as “an unchecked, secret power that makes it invisible to public scrutiny and difficult even for congressional oversight.” Howell now is a managing director and general counsel at Stroz Friedberg LLC, a computer forensic firm in the District. Under the Foreign Intelligence Surveillance Act (FISA), the government has the power to obtain secret warrants for telephone wiretaps, electronic monitoring and physical searches in counterterrorism and espionage cases. The Justice Department has expanded its use of such warrants since a favorable FISA court ruling last year, which determined that the Patriot Act gave federal officials broad new authority to obtain them. SECRET WARNINGS The warrants, cloaked in secrecy and largely ignored by the public for years, have become a central issue in the ongoing debate over missteps before the Sept. 11 attacks. The FBI has come under sharp criticism from lawmakers who say FBI officials misread the FISA statute in the case of Zacarias Moussaoui, the alleged terror conspirator who was in custody before the attacks. No warrant was sought in the Moussaoui case, and his computer and other belongings were not searched until after the attacks. Even less well known are provisions that allow the attorney general to authorize these secret warrants on his own in emergency situations. The department then has 72 hours from the time a search or wiretap is launched to obtain approval from the FISA court, whose proceedings and findings are closed to the public. Officials said that Ashcroft can use his emergency power when he believes there is no time to wait for the FISA court to approve a warrant. There are no additional restrictions on emergency warrants, other than the rules that apply to all FISA applications, officials said. Ashcroft told lawmakers earlier this month that Justice made more than 1,000 applications for warrants to the secret court in 2002, including more than 170 in the emergency category. In the previous 23 years, only 47 emergency FISA warrants were issued. FBI Director Robert S. Mueller III, in similar testimony to the Senate Judiciary Committee, said, “We can often establish electronic surveillance within hours of establishing probable cause that an individual is an appropriate FISA subject.” “We have made full and very productive use of the emergency FISA process,” Mueller said. Sobel and other civil liberties advocates say they are troubled by the aggressive use of emergency FISAs because it leaves the initial decision up to the attorney general and allows clandestine searches and surveillance for up to three days before any court review. Staff researcher Madonna Lebling contributed to this report. © 2003 The Washington Post Company Forwarded for your information. The text and intent of the article have to stand on their own merits. ~~~~~~~~~~~~~~~~~~~~ In accordance with Title 17 U.S.C. section 107, this material is distributed without charge or profit to those who have expressed a prior interest in receiving this type of information for non-profit research and educational purposes only. ~~~~~~~~~~~~~~~~~~~~ "Do not believe in anything simply because you have heard it. Do not believe simply because it has been handed down for many genera- tions. Do not believe in anything simply because it is spoken and rumoured by many. Do not believe in anything simply because it is written in Holy Scriptures. Do not believe in anything merely on the authority of teachers, elders or wise men. Believe only after careful observation and analysis, when you find that it agrees with reason and is conducive to the good and benefit of one and all. Then accept it and live up to it." The Buddha on Belief, from the Kalama Sutra <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http://archive.jab.org/[EMAIL PROTECTED]/ <A HREF="http://archive.jab.org/[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om