-Caveat Lector-   <A HREF="http://www.ctrl.org/">
</A> -Cui Bono?-

http://www.apbnews.com:80/newscenter/internetcrime/2000/04/07/netprivacy0407_01.html



             Too Many Cops on the
             Information Superhighway?
             Congress Weighs Privacy vs. Pursuit of
             Cybercrime

             April 7, 2000

             By Amy Worden

                       WASHINGTON (APBNews.com) --
                       Privacy rights advocates and legal
                       experts Thursday told members of a
                       congressional committee that the
                       ever-widening scope of criminal
                       investigations into computer crimes is
                       jeopardizing the privacy rights of
                       innocent people.

             Addressing members of a House judiciary
             subcommittee, the panelists warned that as law
             enforcement expands its efforts to capture computer
             hackers and others commit Internet crimes, untold
             amounts of data are being swept up in so-called
             cyber-raids.

             "As they vacuum in more information off the Internet,
             they manipulate it and store it, and, the fear is, abuse
             it," said Rep. Robert Barr, R-Ga.

             But a Justice Department official testified that
             investigators need the power to follow criminals
             through cyberspace, which has become a medium for
             con artists and data thieves along with legitimate
             businesses.

             Both sides agree that laws drawn
             up to deal with communication by
             letter and telephone need to be
             updated for the electronic age.

             'Digital Storm'

             Barr, who plans to introduce
             legislation to better protect
             Internet privacy and regulate law
             enforcement's surveillance
             powers, said he has serious
             concerns about the growing
             ability of federal agencies to
             gather massive amounts of
             information from the Web.

             Among the more troubling
             initiatives, he said, are the Security and Exchange
             Commission's expanded data collection efforts and the
             FBI's proposed new information technology system.

             The FBI's $15 million system, dubbed "Digital Storm,"
             would give analysts access to a network to conduct
             "data mining" on vast amounts of digital records to
             detect clues among millions of computer files now
             stored on unlinked FBI computers.

             The hearing was the first in what Barr said will be a
             series exploring ways to balance the needs of law
             enforcement to fight Internet crimes, while protecting
             Fourth Amendment rights against unlawful search and
             seizure.

             Laws becoming obsolete

             Barr said the existing privacy laws are fast becoming
             obsolete and fail to recognize the uniqueness of
             Internet communication, the vast expansion of the
             Web and the exponential growth of the number of
             users.

             Already, law enforcement has virtually unlimited power
             to seize computer-based records, some privacy
             advocates said.

             "Legally, it is easier for the government to snoop
             through a couple's private e-mails to one another than
             it is for the government to listen in on the very same
             conversations if they take place on the phone," said
             Gregory Nojeim, an attorney for the American Civil
             Liberties Union. "The distinction cannot be justified --
             electronic conversations deserve the same level of
             protection as our telephone calls."

             Under existing privacy protection, law enforcement
             officials need only receive a court order for most
             computer searches, which are granted in nearly all
             cases, panelists said. In contrast, searches of an
             individual's home or business require a warrant.

             A haven for criminals?

             But Justice Department officials maintain that current
             statutes require the government be subjected to a
             higher burden of proof than is required under the
             Fourth Amendment.

                       Still, Deputy Associate Attorney
                       General Kevin DiGregory, who heads
                       the Justice Department's cybercrime
                       and intellectual property division, said
                       broad authority to track targets online
                       is vital to tracing the trail from
                       perpetrator to victim in computer
                       crimes.

                       He said citizens' vulnerability for
             computer crimes is "astonishingly high," and that the
             government is working to protect privacy rights while
             trying to chase criminals through cyberspace.

             Computer trails "are the fingerprints of the 21st
             century," DiGregory said. "But they are harder to find
             and not as permanent."

             Internet snooping regulated

             He said investigators are instructed to handle online
             investigations with the same privacy standards as
             offline.

             DiGregory tried to reassure lawmakers that the FBI
             was not adopting any new procedures involving
             search and seizure cases.

             "The regulations that govern the physical world apply
             on the Internet," he said.

             The FBI has responded to concerns by forming a
             privacy council, headed by Patrick Kelly, the agency's
             deputy general counsel, to protect against
             unwarranted intrusions. The council will, among other
             things, create privacy rules for databases containing
             more than 10,000 documents.

             "It's not just about building audit trails," said FBI
             spokesman Paul Bresson. "It goes above and beyond,
             by forming a council to oversee all activity on the
             system to detect any misuse."

             Innocent interceptions skyrocket

             Some civil liberties groups say collection of data is
             outpacing the government's ability to ensure that only
             information belonging to targets of investigations is
             scrutinized.

             Citing statistics published by the Administrative Office
             of U.S. Courts, Nojeim said that the number of
             innocent exchanges recorded by government agents
             has skyrocketed. Between 1969 and 1973, more than
             half of the communications intercepted in law
             enforcement electronic surveillance were
             incriminating, compared to the four-year period ending
             in 1998 when only one-fifth of the communications
             intercepted were incriminating.

             "Each time a federal or state electronic surveillance
             intercept is installed, on average of 1,608 innocent
             conversations are intercepted," he added.

             James Dempsey, senior staff counsel for the Center
             for Democracy and Technology, said confusion exists
             because many standards apply to the same piece of
             information.

             A variety of standards

             "E-mail while in transit over the phone line is covered
             under one statute, while storage at an Internet service
             provider is subject to a different standard," he said.
             "After you open an e-mail and leave it on the server,
             it's protected by another standard, and when you print
             it out it's subject to a fourth standard."

             Dempsey said the existing standards are outdated and
             limited.

             "It's incumbent upon Congress to raise the legal
             standards for access to information," he said.

             Law enforcement officials say they need the ability to
             stay on par with criminals.

             "We want to put in place technology that exists today
             to catch up with the rest of the world," Bresson said.

             Sacrificing rights?

             But Barr told APBnews.com that just because
             computer criminals have access to certain
             technologies, it is not a reason for Americans to give
             up their constitutional rights.

             "Every time there's a gunfight, we hear calls for more
             arms simply because the bad guys have them and that
             we have to equip ourselves with something more
             lethal," he said. "Certainly we have to make sure
             government has what it needs to stop crime, but we
             can't blindly buy into the argument that we have to
             sacrifice privacy."

             Amy Worden is an APBnews.com staff writer in Washington
             ([EMAIL PROTECTED]).

--
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------





________________________________________________________
                           1stUp.com - Free the Web®
   Get your free Internet access at http://www.1stUp.com

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are not allowed. Substance—not soap-boxing!  These are sordid matters
and 'conspiracy theory'—with its many half-truths, misdirections and outright
frauds—is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to