DEA, NSA Teamwork: 6 Privacy Worries

  /     /     /  
Publicated : 22/11/2024   Category : security


DEA, NSA Teamwork: 6 Privacy Worries


Government agents investigating criminal cases reportedly are tapping into NSA-furnished intelligence. Legal experts cry foul.



9 Android Apps To Improve Security, Privacy (click image for larger view)
A secretive U.S. Drug Enforcement Agency unit is taking information gathered by intelligence agencies and using it to prosecute Americans, sometimes for minor offenses, according to a
Reuters report
. Furthermore, DEA agents have been instructed to obfuscate how they came into possession of the information and reverse-engineer the evidence trail to make it appear as if the information was obtained through other means, Reuters reported.
At question are the practices of the DEAs Special Operations Division (SOD), which works with two dozen partner agencies, including the CIA, National Security Agency, Internal Revenue Service and Department of Homeland Security. The DEA unit reportedly has been passing NSA-furnished counterterrorism surveillance -- including wiretap information, tips and telephone records -- to other agencies, some of which are using it as part of criminal investigations unrelated to espionage, terrorism or nuclear proliferation.
The DEA is part of the Department of Justice, which this week launched a related investigation. The department is looking into the issues raised by the story, said a department spokesman via email.
The information-sharing -- and obfuscation -- revelations also have lead to an outcry from civil rights and privacy experts, who said the practice likely violates Fourth Amendment protections against unreasonable search and seizure. This is really bad. The surveillance state is closer than most of us think, said Bruce Schneier, chief security technology officer of BT, in a
blog post
.
Here are six related concerns:
1. Leaked NSA Operating Guidelines Grant Broad Latitude.
The
information-sharing guidelines for the NSAs surveillance programs
were first published in June, after being leaked by NSA whistleblower Edward Snowden.
In general, the guidelines require agency analysts to practice minimization techniques to ensure that theyre not analyzing information about U.S. citizens. But the guidelines give them broad leeway to share inadvertently collected domestic communications. In addition, the NSA can retain -- for up to six months -- communications that dont contain foreign intelligence information but that are reasonably believed to contain evidence of a crime that has been, is being, or is about to be committed, and allow them to share this information with law enforcement agencies, typically the FBI. At that point, the bureau could attempt to obtain a probable-cause warrant from a judge.
But some legal experts have said that this information-sharing arrangement violates the Constitution. The NSA intercepts, whether they are mail covers, metadata or what have you, are in essence general warrants, Denver-based
criminal defense attorney Harold Haddon
told the
San Francisco Chronicle
. But using those warrants as part of a criminal investigation is a bright-line Fourth Amendment violation.
2. Spooks Say Intelligence Cant Be Ordered Up.
U.S. intelligence officials have defended the sharing as involving information that NSA happens to discover, rather than seeks out on behalf of law enforcement agencies. We cant task the collection of information for those purposes, and the Department of Justice cant ask us to collect evidence of that kind of a crime, Robert Litt, general counsel for the Office of the Director of National Intelligence, recently told an audience at the Brookings Institution, reported the
San Francisco Chronicle
.
But his detailing of the practice suggested that information is shared for many more types of crimes than might have been suggested at first. If the intelligence agency uncovers evidence of any crime ranging from sexual abuse to [the Foreign Corrupt Practices Act], they tend to turn that information over to the Department of Justice, Litt said. But the Department of Justice cannot task the intelligence community to do that.
3. Scope Creep: Welcome To The Surveillance State.
Privacy and civil rights groups have responded to the revelations over the DEAs SOD unit by asking what protections are in place to review whether that information sharing is
appropriate
or legal.
Last month, I
wrote about
the potential for mass surveillance mission creep: the tendency for the vast NSA surveillance apparatus to be used for other, lesser, crimes, said Schneier, who joined the board of directors of privacy rights group Electronic Frontier Foundation in the wake of details about
Prism
and
other NSA surveillance programs
being made public. My essay was theoretical, but it turns out to be already happening.
4. Lack Of Surveillance Oversight: Secrets Within Secrets.
Of course, intelligence programs are often justified as being a necessary evil, and their workings guarded from public scrutiny, lest the information help foreign intelligence agents avoid counterespionage efforts. But what happens when the fruits of a countrys intelligence programs are directed at its own citizenry, and government agents then lie about how they obtained the information?
I have never heard of anything like this at all, Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011, told Reuters. It is one thing to create special rules for national security, she said. Ordinary crime is entirely different. It sounds like they are phonying up investigations.
5. DEA Agents Told To Stay Quiet.
Remember that the utilization of SOD cannot be revealed or discussed in any investigative function, said a DEA document obtained by Reuters. Accordingly, the document instructed agents to pursue parallel construction, which involves working backward to justify the need for an investigation using other means. Or, in the parlance of the DEA document, agents are advised to use normal investigative techniques to recreate the information provided by SOD.
According to numerous legal experts, using parallel construction might be legal for demonstrating probable cause; for example, to obtain a warrant. But not disclosing where the evidence was originally obtained might violate pretrial rules designed to ensure that defendants are granted access to all evidence that might be used against them in court -- and which might help them prove their innocence.
The DEA is violating our fundamental right to a fair trial, said Ezekiel Edwards, director of the ACLUs criminal law reform project, in a statement. When someone is accused of a crime, the Constitution guarantees the right to examine the governments evidence, including its sources, and confront the witnesses against them. Our due process rights are at risk when our federal government hides and distorts the sources of evidence used as the basis for arrests and prosecutions.
6. NSA Programs Still On Shaky Legal Grounds.
The DEAs use and distribution of evidence gleaned from intelligence dragnets -- and then disguising its origins -- has legal experts further up in arms precisely because the legality of the dragnets themselves remains an open question. Although White House officials have said that the programs fully comply with the Patriot Act, as well as the Foreign Intelligence Surveillance Act (FISA), which is overseen by the Foreign Intelligence Surveillance Court (FISC), legislators arent so sure.
I am extremely disturbed by what appears to be an
overbroad interpretation of the Act
, said Rep. James Sensenbrenner (R-Wis.), the author of the Patriot Act, in a letter he sent to Attorney General Eric Holder in June. Holder, of course, leads the Department of Justice, which is now investigating the DEAs use of that intelligence. According to documents leaked by Snowden, Holder also signed a secret 2009 memorandum laying out the minimization procedures that NSA analysts needed to use to help them avoid spying on American citizens.

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
DEA, NSA Teamwork: 6 Privacy Worries