For years, those of us who have tried to
warn the American public that Big Brother monitors all Internet users
were demonized, vilified and ridiculed.
Now, the mainstream media has proven us correct.
“The U.S. government — and likely your
own government, for that matter — is either watching your online
activity every minute of the day through automated methods and non-human
eavesdropping techniques, or has the ability to dip in as and when it
deems necessary — sometimes with a warrant, sometimes without,” ZDNet reported earlier this month. “That tin-foil hat really isn’t going to help. Take it off, you look silly.”
The Petraeus case
Where’s the proof that the government has this capability?
You might recall a fellow by the name of (retired) Gen. David Petraeus. He’s been in the news lately.
This four-star general-turned-CIA chief
just resigned his post after news broke that he had engaged in an
extra-marital affair with is biographer, herself a West Point graduate
and former Army officer.
What led to this shocking discovery was Petraeus’ use, of all things, Google’s online email service, Gmail.
According to federal law, mind you, authorities are not legally permitted to electronically snoop around in your email box.
“The government can’t just wander through
your emails just because they’d like to know what you’re thinking or
doing,” Stewart Baker, a former assistant secretary at the Homeland
Security Department who’s now in private law practice, told The Associated Press. “But if the government is investigating a crime, it has a lot of authority to review people’s emails.”
Or, in the case of the CIA, if the agency wants to track a suspect ostensibly for “national security” purposes. Ditto the NSA.
The wrangling of Petraeus’ email account
has certainly landed him in a world of trouble, but his story has also,
once again, ignited a new the debate over when, how and why governments
and law enforcement agencies alike are able to access the email accounts
of ordinary citizens – even if they head up the most powerful spy
agency in the world.
Granted, experts say “the little people”
needn’t worry much about having their online presence tracked. Agencies
like the CIA generally tend to have bigger fish to fry, so to speak.
But nevertheless, the technology to pilfer email accounts at will
obviously exists.
“Forget ECHELON, or signals intelligence,
or the interception of communications by black boxes installed covertly
in data centers,” writes Zack Whittaker for ZDNet.
“Intelligence agencies and law enforcement bodies can access – thanks to
the shift towards Web-based email services in the cloud – but it’s not
as exciting or as Jack Bauer-esque as one may think or hope for.”
(Editor’s Note: ECHELON, for those who are unfamiliar with it, is
the name of “a global Communications Interception (COMINT) system
created by the United States, the United Kingdom, Canada, Australia and
New Zealand to routinely and indiscriminately monitor and record all
forms of electronic communications worldwide (both military and
civilian) and overseen by the National Security Agency,” according to
one published description of the program.)
How the top CIA official got busted
When he set up his private Gmail
account, Petraeus used a pseudonym and composed email messages but
never sent them. They were instead saved as drafts. His lover, Paula
Broadwell, would then log in under the same account, read the drafts
then reply to them in the same manner – as a draft, without actually
sending the message.
The exchanges would not be sent across
the networks through Google’s data centers, which would make it nearly
impossible for the NSA or any other ELINT (electronic intelligence)
agency (like Britain’s GCHQ or the Israeli Mossad) to “read” the
messages while they are in transit between accounts.
Other sinister operators – terrorists, pedophiles and the like – have been known to use the same trick to avoid detection, ZDNet reported.
“But surely IP addresses are logged and
noted? When emails are sent and received, yes. But the emails were saved
in draft and therefore were not sent. However, Google may still have a
record of the IP addresses of those who logged into the account,” the
report said.
In the end, the FBI used a little-know law called the Stored Communications Act, which is part of the Electronic Communications Privacy Act,
as the basis for getting a warrant to view Petraeus’ private Gmail
account. And that’s how agents found the stored messages that were never
actually sent.
“Once it knew Ms. Broadwell was the
sender of the threatening messages, the FBI got a warrant that gave it
covert access to the anonymous email account,” the BBC’s Mark Ward reported.
Sources:
No comments:
Post a Comment