[Politech logo]

Politech is the oldest Internet resource devoted to politics and technology. Launched in 1994 by Declan McCullagh, the mailing list has chronicled the growing intersection of culture, technology, politics, and law. Since 2000, so has the Politech web site.

FBI surreptitious black bag jobs circumvent encryption products




Here's an article I wrote about this possibility over a year ago:

http://www.wired.com/news/politics/0,1283,21810,00.html
>Another answer might lie in a little-noticed section of the legislation 
>the White House has sent to Congress. It says that during civil cases or 
>criminal prosecutions, the Feds can use decrypted evidence in court 
>without revealing how they descrambled it.

-Declan

*********

Date: Tue, 5 Dec 2000 16:24:44 -0500
To: declan@well.com
From: David Sobel <sobel@epic.org>
Subject: FBI Break-in Targets Use of Encryption
Cc: politech@politechbot.com

As many of us have long predicted, it is now a matter of record
that the FBI can, and does, conduct surreptitious entries
to counter the use of encryption.

The FBI application is at:

      http://www.epic.org/crypto/breakin/application.pdf

The court order is at:

      http://www.epic.org/crypto/breakin/order.pdf

=========================================================

http://inq.philly.com/content/inquirer/2000/12/04/front_page/JMOB04.htm

A federal gambling case against the son of jailed mob boss
Nicodemo "Little Nicky" Scarfo could instead be the first legal
test of cutting-edge cyber-surveillance technology that some
critics of federal investigations say borders on Big Brotherism.

Court records in the pending case indicate that Nicodemo S.
Scarfo, 35, was the target of a sophisticated surveillance tool
- a so-called keystroke-logging device - that allowed the FBI to
reproduce every stroke he entered on a computer on which
gambling records allegedly were stored.

Scarfo subsequently was charged with supervising a mob-linked
bookmaking and loan-sharking operation in North Jersey.

Questions about the FBI's spying methods in the Scarfo
investigation surface at a time when defense lawyers and civil
libertarians have begun to ask how far federal authorities
should be permitted to go with electronic surveillance. Critics
say that technology is evolving faster than the laws governing
privacy rights and that federal investigators, emboldened by the
capabilities of their cyber-tools, frequently disregard
constitutional guarantees.

. . .

The FBI would not comment. Assistant U.S. Attorney Ronald D.
Wigler, the prosecutor in the case, said only that he expected
the FBI's surveillance methods would be challenged in a pretrial
defense motion and that arguments could establish new case law.

"I can't talk about any of it," he said, "but I think it's
correct to say this is [a] cutting-edge [legal issue]."

. . .

[Scarfo's lawyer] would not discuss what his client was storing
on the encrypted program but said Scarfo was using software known
as PGP.

"It stands for Pretty Good Privacy," the lawyer said with a
chuckle.



-------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
You may redistribute this message freely if it remains intact.
To subscribe, visit http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
-------------------------------------------------------------------------




Enter your email address to join Politech, Declan McCullagh's moderated technology and politics announcement list:

Return to politechbot.com