-Caveat Lector-

FBI Using High-Tech Gadgets

Sat, Jul 28, 2001
By D. IAN HOPPER, AP Technology Writer

WASHINGTON (AP) - By bugging a keyboard or using special software, FBI
agents can remotely capture a computer user's every keystroke.

With a black box, they can intercept e-mail from miles away.

In a van parked outside, they secretly can recreate the pictures on a
computer screen from its electromagnetic energy.

The legal limits for these new investigative tools will get a test Monday
when a federal court in New Jersey examines a mob case in which agents,
without a wiretap order, recorded a suspect's computer keystrokes.

Privacy experts are watching the case of Nicodemo S. Scarfo Jr. with great
interest because it could bring major changes to investigative tactics in
the online age.

"It's the idea of secret government surveillance technology being installed
with very little oversight or accountability," David Sobel of the
Washington-based Electronic Privacy Information Center said. "It gets about
as close to the common perception of Big Brother as anything I could really
imagine."

Armed only with a search warrant, the FBI broke into Scarfo's business and
put either a program on his computer or an electronic bug in his keyboard -
officials will not say which - and recorded everything typed by the son of
the jailed former boss of the Philadelphia mob.

The FBI says it needed a password in order to decrypt coded files that
allegedly contained records of illegal gambling and loan-sharking operations.

Scarfo used the software PGP - Pretty Good Privacy - to encode his records.
PGP is a strong, free encryption program that can be used for e-mail or
individual files. The FBI tried to break the encryption without the
password, but failed. So agents surreptitiously bugged the computer to
capture it from Scarfo himself.

Scarfo's lawyer wants a Newark, N.J., federal court to suppress the
evidence and make the FBI say how the bug worked. The lawyer says that
because the FBI recorded everything Scarfo typed, they got private e-mails
that were not part of the investigation.

U.S. Attorney Robert J. Cleary has told the court that the surveillance
device is a "highly sensitive law enforcement search and seizure technique"
and should not be made public.

Mark Rasch, former head of the Justice Department's computer crimes
section, said that if the device transmitted the captured keystrokes back
to the police via e-mail, or emitted them through radio signals, then it
might be considered a wiretap.

"You really need to understand at what point it captured things, and how it
got it back to the government, in order to figure out what the Fourth
Amendment concerns are," Rasch said.

Authorities have to meet a much higher standard for a full wiretap, which
includes filtering out nonrelevant communications and having stronger proof
that a crime is taking place.

The government argues it only needed a search warrant for Scarfo's computer
because the captured keystrokes were not immediately being transmitted on
the phone line or on the Internet, and should not be considered the
products of a wiretap.

There are many tools the FBI can use for secretly capturing computer
information.

Earlier this year, the FBI used a keystroke bug to nab two Russians
suspected of hacking into U.S. Internet companies. The Russians have not
yet gone to trial.

In addition to the keystroke logger, technicians can sneak in a program
that will take intermittent snapshots of the monitor, or install a hidden
camera pointed at the computer.

There is even a system called TEMPEST that detects electromagnetic
emanations from a computer monitor. Agents in a van parked outside can then
reconstruct the desktop.

The FBI also has received widespread attention for a device - formerly
known as Carnivore and now called DCS 1000 - that can follow suspects' Web
browsing, e-mail and instant messages.

"If they can find a way to read your mail or peek in your bedroom and find
a way for a judge to authorize them to do it, they will do it," Rasch said.

The Supreme Court recently reined in one high-tech tactic when it ruled
police needed a warrant to use a special heat-sensing device to discover
that a man was growing marijuana in his home.

However the Scarfo case ends, Sobel said, the high-tech crime landscape is
bound to change.

"I think it has significant implications for future law enforcement
investigations," he said. "This type of investigation is the wave of the
future."
----------------------
On the Net:

PGP: http://www.pgp.com
Federal Bureau of Investigation: http://www.fbi.gov
Electronic Privacy Information Center: http://www.epic.org

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to