SlideShare a Scribd company logo
1 of 48
An Encyclopedia of
Wiretaps
Wendy Knox Everette
@wendyck
BSidesLV 2018
August 7, 2018
Who am I? Hacker lawyer. Has handled law enforcement
requests for companies.
I am a lawyer. I am very much not your
lawyer.
Surveillance law
101
● Is mostly statutes
● We refer to these by numbered
titles, like 18 USC 3233 or names,
like CALEA
4th Amendment creates the
groundwork for this area
● Based on the “reasonable
expectation of privacy”
standard
● Most 4th Amendment law is
case law
Title III ⁃ The law that
created the modern
wiretap framework
Electronic Communications Privacy Act & Stored
Communications Act
CALEA
● telecom providers are required to assist law
enforcement
● fuzzy applicability to internet service companies
Foreign Intelligence
wiretaps and warrants
What is FISA, and how does legal process
involving foreign intelligence differ?
How do court orders work?
Law enforcement officer goes to a judge with an
authorization request. The judge then issues an
order, and this is sent to the company.
Classifying types of
lawful process
Content: body of a letter while Metadata: addresses on the letter
○ Content requires a warrant. Metadata requires a subpoena
Warrants require a judge to determine that there is
probable cause: reasonable basis for believing that a
crime may have been committed (for an arrest) or when
evidence of the crime is present in the place to be
searched
Stored Content
Warrants
Subpoenas
PRTTs: Pen Register
Trap & Trace
Anatomy of a PRTT order
18 U.S.C. § 3121 to
collect URLs and IP
Addresses
Title III Wiretap
Necessity:
“full and complete
statement” describing all
other investigative
techniques that have been
tried and failed or
explaining why such
techniques are likely to be
unsuccessful or too
dangerous 18 U.S.C. §
2518(1)(c)
Particularity
“details” underlying the alleged offense and a
“particular description” of the nature and location
of the facilities or place to be wiretapped, the type
of communication to be intercepted, and the
persons committing the offense and whose
communications are to be intercepted 18 U.S.C. §
2518(1)(b)
Geographic Scope: Roving Wiretaps
Wiretap time period
● 30 days at most - down to the time of the
order (you check the timestamp the Judge
signed with)
● Starts at date of the order or within 10 days
● May be renewed
Anatomy of a Wiretap
order
1. Must reference an application
under oath by a person qualified
to make the application
2. Must state that there is probable
cause
3. Must reference violations of a
crime specified in Title III that a
wiretap can be used to
investigate
1. Must specify place
interception will occur
2. Must specific that other
investigative techniques
have been tried or are not
feasible
3. Must specify that
communications relate to
the offenses being
investigated
4. Must state that the LEAs
are authorized to intercept
communications
5. Termination clause
1. Authorization applies to changed phone numbers, etc
2. Technical assistance clause
1. Nondisclosure clause
2. Time period: 30 days
3. Termination of monitoring
4. Reports to the court
1. Judge’s signature and date (often includes
time as well)
Consent based order: these are different
● For longer periods of time
● A target has granted law enforcement consent to
have an ISP or other provider monitor their
communications
Subscriber data/(d) Orders: 18 USC 2703(d)
● Usually tacked onto a wiretap
● Gets you subscriber data about the target
● Court order must use specific language:
○ “specific and articulable facts showing that there are
reasonable grounds to believe that the contents of a
wire or electronic communication, or the records or
other information sought, are relevant and material to
an ongoing criminal investigation”
National Security Letters
These received a lot of
attention a few years ago when
recipients were banned from
even consulting with attorneys
about them.
Extremely limited in data that
is returned
NSLs are a form of
administrative subpoena, and
do not require a judge’s order
First NSL in 1978 was an amendment to the Right
to Financial Privacy Act. Currently there are five
statutory bases of authority for NSLs:
● Section 1114(a)(5) of the Right to Financial
Privacy Act (codified at 12 U.S.C. 3414)
● Sections 626 and 627 of the Fair Credit
Reporting Act (codified at 15 U.S.C. 1681u,
1691v)
● Electronic Communications Privacy Act
(ECPA) §2709 (codified at 18 U.S.C. 2709)
● Section 802 of the National Security Act
(codified at 50 U.S.C. 3162)
2016
● 12,150 NSLs resulted in 24,801 ROIs
2017
● 12,762 NSLs resulted in 41,579 ROIs
https://www.dni.gov/files/documents/icotr/2018-ASTR----CY2017----FINAL-for-Release-5.4.18.pdf
Section 702
● FISA Court orders for data in cases
involving foreign intelligence threats to
the US.
● A FISC judge approves requests after
reviewing targets and procedures meant
to minimize the amount of data collected
to avoid unnecessary or overly broad
data collection.
● Once approved, FBI agents can use
the court orders to access metadata or
content and perform electronic
surveillance.
Section 702:
● allows for targeted collection of content for targets outside the
United States and is accompanied by a nondisclosure provision
● “about” collection by the Government of communications
to/from/about a target
● Can extend up to three “hops” from the target
● “Backdoor” searches by the FBI are a concern
● number of targets subject to Section 702 in latest ODNI
transparency report: 129,080 individuals, groups, or entities
All Writs Act
Courts may issue all writs
necessary or appropriate in
aid of their respective
jurisdictions and agreeable
to the usages and
principles of law
United States v. New York Telephone Co.,
434 U.S. 159 (1977)
“We agree that the power of federal courts to impose
duties upon third parties is not without limits;
unreasonable burdens may not be imposed.”
Sources
● "National Security Investigations & Prosecutions, 2nd ed. (Vols. 1 & 2)," by David S. Kris and J.
Douglas Wilson
● US Attorney’s Manual, Section 9-7.000 - Electronic Surveillance,
https://www.justice.gov/usam/usam-9-7000-electronic-surveillance
● FBI Domestic Investigations and Operations Guide
https://vault.fbi.gov/FBI%20Domestic%20Investigations%20and%20Operations%20Guide%20%28D
IOG%29/FBI%20Domestic%20Investigations%20and%20Operations%20Guide%20%28DIOG%29
%202016%20Version
● DOJ CCIPs Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal
Investigations https://www.justice.gov/sites/default/files/criminal-
ccips/legacy/2015/01/14/ssmanual2009.pdf
● ODNI 2017 Transparency Report, https://www.dni.gov/files/documents/icotr/2018-ASTR----CY2017--
--FINAL-for-Release-5.4.18.pdf
● Lawfare blog, https://www.lawfareblog.com
● Hornbook on Criminal Procedure, by Wayne LaFave, Jerold Israel, Nancy King, Orin Kerr,
https://www.amazon.com/Hornbook-Criminal-Procedure-5th-Hornbooks/dp/0314199365

More Related Content

What's hot

Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessHostingCon
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Charles Mok
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunalAnkita Sharma
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Surveillance and the Law: Language, Power, and Privacy (TILT Keynote, Februar...
Surveillance and the Law: Language, Power, and Privacy (TILT Keynote, Februar...Surveillance and the Law: Language, Power, and Privacy (TILT Keynote, Februar...
Surveillance and the Law: Language, Power, and Privacy (TILT Keynote, Februar...Maria Murphy
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)franciscronje
 
CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]Heriberto Luna
 

What's hot (20)

Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Turn It Back On
Turn It Back OnTurn It Back On
Turn It Back On
 
Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
After 9 11
After 9 11After 9 11
After 9 11
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Surveillance and the Law: Language, Power, and Privacy (TILT Keynote, Februar...
Surveillance and the Law: Language, Power, and Privacy (TILT Keynote, Februar...Surveillance and the Law: Language, Power, and Privacy (TILT Keynote, Februar...
Surveillance and the Law: Language, Power, and Privacy (TILT Keynote, Februar...
 
Indian cyber law
Indian cyber lawIndian cyber law
Indian cyber law
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Skillsclass2a
Skillsclass2aSkillsclass2a
Skillsclass2a
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)
 
CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]
 

Similar to An Encyclopedia of Wiretaps

Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summarysevans-idaho
 
1 (Slip Opinion) OCTOB
1 (Slip Opinion) OCTOB1 (Slip Opinion) OCTOB
1 (Slip Opinion) OCTOBVannaJoy20
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassCTIN
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfHari319621
 
Post US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsPost US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsTrustArc
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretappingAngela Strudwick
 
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docxtroutmanboris
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawCharles Mudd
 
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil ProcedureNEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil ProcedureFinancial Poise
 
Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Richard Austin
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxmckerliejonelle
 

Similar to An Encyclopedia of Wiretaps (20)

Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
 
1 (Slip Opinion) OCTOB.docx
1 (Slip Opinion) OCTOB.docx1 (Slip Opinion) OCTOB.docx
1 (Slip Opinion) OCTOB.docx
 
1 (Slip Opinion) OCTOB
1 (Slip Opinion) OCTOB1 (Slip Opinion) OCTOB
1 (Slip Opinion) OCTOB
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdf
 
Post US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsPost US Election Privacy Updates & Implications
Post US Election Privacy Updates & Implications
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
FOIL
FOILFOIL
FOIL
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search Warrant
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
 
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
 
04 privacy
04 privacy04 privacy
04 privacy
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
 
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil ProcedureNEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
 
Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015
 
RRDP - 2015.02.26
RRDP - 2015.02.26RRDP - 2015.02.26
RRDP - 2015.02.26
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
 

More from Wendy Knox Everette

FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)Wendy Knox Everette
 
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...Wendy Knox Everette
 
Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Wendy Knox Everette
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"Wendy Knox Everette
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019Wendy Knox Everette
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Wendy Knox Everette
 
SeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeSeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeWendy Knox Everette
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaWendy Knox Everette
 
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017Wendy Knox Everette
 
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Wendy Knox Everette
 

More from Wendy Knox Everette (13)

FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)
 
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
 
Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018
 
SeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeSeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & Me
 
Green Locks for You and Me
Green Locks for You and MeGreen Locks for You and Me
Green Locks for You and Me
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
 
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
 
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
 

Recently uploaded

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...nirzagarg
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 

Recently uploaded (20)

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 

An Encyclopedia of Wiretaps

  • 1. An Encyclopedia of Wiretaps Wendy Knox Everette @wendyck BSidesLV 2018 August 7, 2018
  • 2. Who am I? Hacker lawyer. Has handled law enforcement requests for companies. I am a lawyer. I am very much not your lawyer.
  • 3. Surveillance law 101 ● Is mostly statutes ● We refer to these by numbered titles, like 18 USC 3233 or names, like CALEA
  • 4. 4th Amendment creates the groundwork for this area ● Based on the “reasonable expectation of privacy” standard ● Most 4th Amendment law is case law
  • 5. Title III ⁃ The law that created the modern wiretap framework
  • 6. Electronic Communications Privacy Act & Stored Communications Act
  • 7. CALEA ● telecom providers are required to assist law enforcement ● fuzzy applicability to internet service companies
  • 8. Foreign Intelligence wiretaps and warrants What is FISA, and how does legal process involving foreign intelligence differ?
  • 9. How do court orders work? Law enforcement officer goes to a judge with an authorization request. The judge then issues an order, and this is sent to the company.
  • 11. Content: body of a letter while Metadata: addresses on the letter ○ Content requires a warrant. Metadata requires a subpoena
  • 12. Warrants require a judge to determine that there is probable cause: reasonable basis for believing that a crime may have been committed (for an arrest) or when evidence of the crime is present in the place to be searched
  • 16. Anatomy of a PRTT order
  • 17.
  • 18.
  • 19.
  • 20. 18 U.S.C. § 3121 to collect URLs and IP Addresses
  • 22. Necessity: “full and complete statement” describing all other investigative techniques that have been tried and failed or explaining why such techniques are likely to be unsuccessful or too dangerous 18 U.S.C. § 2518(1)(c)
  • 23. Particularity “details” underlying the alleged offense and a “particular description” of the nature and location of the facilities or place to be wiretapped, the type of communication to be intercepted, and the persons committing the offense and whose communications are to be intercepted 18 U.S.C. § 2518(1)(b)
  • 25. Wiretap time period ● 30 days at most - down to the time of the order (you check the timestamp the Judge signed with) ● Starts at date of the order or within 10 days ● May be renewed
  • 26. Anatomy of a Wiretap order
  • 27. 1. Must reference an application under oath by a person qualified to make the application 2. Must state that there is probable cause 3. Must reference violations of a crime specified in Title III that a wiretap can be used to investigate
  • 28.
  • 29. 1. Must specify place interception will occur 2. Must specific that other investigative techniques have been tried or are not feasible 3. Must specify that communications relate to the offenses being investigated 4. Must state that the LEAs are authorized to intercept communications 5. Termination clause
  • 30.
  • 31. 1. Authorization applies to changed phone numbers, etc 2. Technical assistance clause
  • 32. 1. Nondisclosure clause 2. Time period: 30 days 3. Termination of monitoring 4. Reports to the court
  • 33. 1. Judge’s signature and date (often includes time as well)
  • 34. Consent based order: these are different ● For longer periods of time ● A target has granted law enforcement consent to have an ISP or other provider monitor their communications
  • 35. Subscriber data/(d) Orders: 18 USC 2703(d) ● Usually tacked onto a wiretap ● Gets you subscriber data about the target ● Court order must use specific language: ○ “specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation”
  • 36. National Security Letters These received a lot of attention a few years ago when recipients were banned from even consulting with attorneys about them. Extremely limited in data that is returned NSLs are a form of administrative subpoena, and do not require a judge’s order
  • 37. First NSL in 1978 was an amendment to the Right to Financial Privacy Act. Currently there are five statutory bases of authority for NSLs: ● Section 1114(a)(5) of the Right to Financial Privacy Act (codified at 12 U.S.C. 3414) ● Sections 626 and 627 of the Fair Credit Reporting Act (codified at 15 U.S.C. 1681u, 1691v) ● Electronic Communications Privacy Act (ECPA) §2709 (codified at 18 U.S.C. 2709) ● Section 802 of the National Security Act (codified at 50 U.S.C. 3162)
  • 38. 2016 ● 12,150 NSLs resulted in 24,801 ROIs 2017 ● 12,762 NSLs resulted in 41,579 ROIs https://www.dni.gov/files/documents/icotr/2018-ASTR----CY2017----FINAL-for-Release-5.4.18.pdf
  • 39. Section 702 ● FISA Court orders for data in cases involving foreign intelligence threats to the US. ● A FISC judge approves requests after reviewing targets and procedures meant to minimize the amount of data collected to avoid unnecessary or overly broad data collection. ● Once approved, FBI agents can use the court orders to access metadata or content and perform electronic surveillance.
  • 40.
  • 41.
  • 42. Section 702: ● allows for targeted collection of content for targets outside the United States and is accompanied by a nondisclosure provision ● “about” collection by the Government of communications to/from/about a target ● Can extend up to three “hops” from the target ● “Backdoor” searches by the FBI are a concern ● number of targets subject to Section 702 in latest ODNI transparency report: 129,080 individuals, groups, or entities
  • 44.
  • 45. Courts may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law
  • 46. United States v. New York Telephone Co., 434 U.S. 159 (1977)
  • 47. “We agree that the power of federal courts to impose duties upon third parties is not without limits; unreasonable burdens may not be imposed.”
  • 48. Sources ● "National Security Investigations & Prosecutions, 2nd ed. (Vols. 1 & 2)," by David S. Kris and J. Douglas Wilson ● US Attorney’s Manual, Section 9-7.000 - Electronic Surveillance, https://www.justice.gov/usam/usam-9-7000-electronic-surveillance ● FBI Domestic Investigations and Operations Guide https://vault.fbi.gov/FBI%20Domestic%20Investigations%20and%20Operations%20Guide%20%28D IOG%29/FBI%20Domestic%20Investigations%20and%20Operations%20Guide%20%28DIOG%29 %202016%20Version ● DOJ CCIPs Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations https://www.justice.gov/sites/default/files/criminal- ccips/legacy/2015/01/14/ssmanual2009.pdf ● ODNI 2017 Transparency Report, https://www.dni.gov/files/documents/icotr/2018-ASTR----CY2017-- --FINAL-for-Release-5.4.18.pdf ● Lawfare blog, https://www.lawfareblog.com ● Hornbook on Criminal Procedure, by Wayne LaFave, Jerold Israel, Nancy King, Orin Kerr, https://www.amazon.com/Hornbook-Criminal-Procedure-5th-Hornbooks/dp/0314199365

Editor's Notes

  1. https://www.flickr.com/photos/judaluz83/6791264616/
  2. Unlike other types of law in our common law system, this is almost entirely based on statutes in the US Code and Executive Orders. These laws are often referred to by statute numbers, like 18 USC 3233: That’s Title 18 (the criminal code), United States Code (the codified laws passed by Congress), section (sometimes written §) 3233. Or by name, like CALEA - Communications Assistance for Law Enforcement Act https://www.flickr.com/photos/seattlemunicipalarchives/2716928469/
  3. The 4th Amendment still applies here, though. It guarantees protection from unreasonable government intrusion, and is largely case law. Ask-> statutes v case law Common law Judge made law www.flickr.com/photos/ianafotog/6903741624
  4. Title three is codified at 18 U.S.C. § 2510, et seq Congress enacted Titlte 3 in 1968 to prohibit private citizens from using electronic surveillance techniques Allowed law enforcement to use wiretaps and record calls, but requires compliance with specific requirements www.flickr.com/photos/jcphotolog/5592963392
  5. 1986, Congress amended Title III by enacting the Electronic Communications Privacy Act of 1986. Specifically, Congress added "electronic communications" as a new category of communications whose interception is covered by Title III. Electronic communications are non-voice communications made over a network in or affecting interstate commerce, and include text messages, electronic mail ("email"), facsimiles ("faxes"), other non-voice Internet traffic, and communications over digital-display pagers. See 18 U.S.C. § 2510(12).
  6. Congress also enacted the Communications Assistance for Law Enforcement Act to require phone service providers to assist law enforcement with wiretaps www.flickr.com/photos/nic1/17262200550
  7. And finally, if the wiretaps are in regarding to a foreign intelligence matter, they would be performed under FISA. https://www.flickr.com/photos/thomashawk/5239613363/
  8. For each of these types of orders, the process is largely about the same. The law enforcement officer makes an application to the court- often after review by a prosecutor - and a judge decides if the applications meets the requirements laid out in the statute, and then approves the order. That order gets sent out to the service provider company to process.
  9. There are a wide array of types of lawful process, some with very arcane requirements. aim is to educate about what types of orders can be used by the government, and to explain in non-legalese what each of the standards means. won’t be any hype, or scare-mongering, or excessive editorializing about the evils or wonders of surveillance. It should instead be informative, hopefully educational.
  10. Distinctions stemming from the very early days of Fourth Amendment case law hold that there is a difference between the contents of communication, such as the body of a letter, and information about that letter, such as address information of the sender and receiver Warrants require a judge to determine that there is probable cause (which is reasonable basis for believing that a crime may have been committed (for an arrest) or when evidence of the crime is present in the place to be searched) www.flickr.com/photos/thomashawk/130601225
  11. ECPA/SCA (Electronic Communications Privacy Act/ Stored Electronic Communications Act) Title I of the ECPA is the Wiretap Act… prohibits the use of illegally obtained communications as evidence. 18 U.S.C. § 2515 TItle II is the Stored Communications Act Title III addresses PRTTs www.flickr.com/photos/thomashawk/7117207093
  12. Subpoena == metadata Pre- Carpenter: Cell site location records Also PRTTs Internet history: email subject lines Is a URL metadata? www.flickr.com/photos/55295643@N03/5648504501
  13. https://twitter.com/todayininfosec/status/1022710364302061569 https://www.flickr.com/photos/cactusbeetroot/4032090668
  14. Sample PRTT order for District Court
  15. In 2001, the USA PATRIOT Act (P.L. 107-56) amended the Pen Register and Trap and Trace Statute (pen/trap statute), 18 U.S.C. § 3121 et seq., to clarify that courts may issue pen/trap orders to collect the non-content information associated with Internet communications. One issue that has been raised in this regard is whether a pen register order may be used to collect (URLs) use of pen registers to collect all or part of a URL is prohibited without prior consultation with CCIPS. Among the factors that should be considered in deciding whether to apply for such a pen register are (1) the investigative need for the pen register order, (2) the litigation risk in the individual case, (3) how much of any given URL would be obtained, and (4) the impact of the order on the Department's policy goals www.flickr.com/photos/babaks/5264900810
  16. www.flickr.com/photos/seanpbarry/130468839 Title III was passed in 1968 as the Omnibus Crime Control and Safe Streets Act of 1968 - referred to as the Wiretap Act State v Fed: State authorities applying in state court under Title III must be authorized by state statute. 18 U.S.C. § 2516(2). Pre-empted state law; state laws should be at least as restrictive as Title 3
  17. Title III applications uniquely require an additional showing of necessity. The government’s application must provide a “full and complete statement” describing all other investigative techniques that have been tried and failed or explaining why such techniques are likely to be unsuccessful or too dangerous. 18 U.S.C. § 2518(1)(c). The court must determine that “normal investigative procedures” have been or would be unsuccessful or excessively dangerous. Id. § 2518(3)(c). A faulty necessity showing can result in suppression.[13]
  18. Only crimes in 18 U.S.C. § 2516(1) may be investigated through the interception of wire or oral communications “full and complete statement of the facts and circumstances,” including “details” underlying the alleged offense and a “particular description” of the nature and location of the facilities or place to be wiretapped, the type of communication to be intercepted, and the persons committing the offense and whose communications are to be intercepted. 18 U.S.C. § 2518(1)(b).
  19. www.flickr.com/photos/deshaunicus/12787132615
  20. www.flickr.com/photos/fmgbain/6395743535
  21. 18 U.S.C. § 2802(b) 18 U.S.C. § 2702(b)(5)
  22. The language of these is messed up all the time Used correctly, can get subscriber data of people that the person targets https://www.flickr.com/photos/sidknee23/3737809354/
  23. NSLs return subscriber data Administraive subpoena means that the agency can issue using their own authority and do not need a judge to sign an order www.flickr.com/photos/jimdelaney/4963088733
  24. From the ODNI Transparency Report URL is also in “Sources” at the end
  25. There has been a lot of confusion about what the standard is to receive one of these (is the FISA court a rubber stamp? Does it require exceptional standards of proof? why is it different from a Title III wiretap or stored content warrant?) https://www.flickr.com/photos/threar/15467482926
  26. ODNI report https://www.dni.gov/files/documents/icotr/2018-ASTR----CY2017----FINAL-for-Release-5.4.18.pdf
  27. passed as part of the Judiciary Act of 1789 https://www.flickr.com/photos/thomashawk/11028266054/
  28. Usually this is really boring stuff to help make the court system run https://www.flickr.com/photos/wiechert/6441071577/
  29. court used the authority of the AWA to order the phone company to lend the FBI a telephone line and to help them install the monitoring device at the phone company (Now we have CALEA)