Searching and Seizing Computers

Total Page:16

File Type:pdf, Size:1020Kb

Searching and Seizing Computers Searching and Seizing Computers Obtaining Electronic Evidence in Criminal Investigations Computer Crime and Intellectual Property Section Criminal Division United States Department of Justice July 2002 DOWNLOADED FROM: Sovereignty Education and Defense Ministry (SEDM) Website http://sedm.org TABLE OF CONTENTS • PREFACE ................................................................................................... 6 • IN"TRODUCTION .......................................................................................... 7 • I. SEARCHIN"G AND SEIZIN"G COMPUTERS WITHOUT A WARRANT .................... 10 • A. Introduction .................................................................................... 10 • B. The Fourth Amendment's "Reasonable Expectation of Privacy" ....................... in Cases Involving Computers .................................................................... 11 • 1. General Principles ..................................................................... 11 • 2. Reasonable Expectation of Privacy in Computers as Storage Devices ......... 11 • 3. Reasonable Expectation of Privacy and Third-Party Possession ................ 13 • 4. Private Searches ........................................................................ 15 • 5. Use of Technology to Obtain Information ............................................ 17 • C. Exceptions to the Warrant Requirement in Cases Involving Computers ................ 18 • 1. Consent .................................................................................. 18 • a) Scope of Consent .............................................................. 18 • b) Third-Party Consent .......................................................... 20 • c) Implied Consent ............................................................... 23 • 2. Exigent Circumstances ................................................................. 24 • 3. Plain View ............................................................................... 25 • 4. Search Incident to a Lawful Arrest ...................................................26 • 5. Inventory Searches ..................................................................... 27 • 6. Border Searches ........................................................................ 28 • 7. International Issues ..................................................................... 29 • D. Special Case: Workplace Searches .......................................................... ,31 • 1. Private Sector Workplace Searches .................................................. 31 • a) Reasonable Expectation of Privacy in Private-Sector Workplaces ..... 32 • b) Consent in Private Sector-Workplaces ..................................... 32 • c) Employer Searches in Private-Sector Workplaces ........................ 33 • 2. Public-Sector Workplace Searches ................................................... 33 • a) Reasonable Expectation of Privacy in Public Workplaces ............... 34 • b) "Reasonable" Workplace Searches Under O'Connor v. Ortega ......... 36 • c) Consent in Public-Sector Workplaces ..................................... .39 • II. SEARCHIN"G AND SEIZIN"G COMPUTERS WITH A WARRANT .......................... .40 • A. Introduction .....................................................................................40 • B. Planning the Search ........................................................................... .43 • 1. Basic Strategies for Executing Computer Searches .............................. .43 2 • a) When Hardware Is Itself Contraband. Evidence. or an ................ Instrumentality or Fruit of Crime ..............................................44 • b) When Hardware is Merely a Storage Device for Evidence of Crime ... , ,,.. ,,;,,., ,,,..,,,,,. ,,,,.,,, ,.,,, ,,.., , , ,. .,,, ,. .. , .,, ,,., ,,,.., ,, ,.,, ,,44 • 2. The Privacy Protection Act .......................................................... .46 • a) A Brief History of the Privacy Protection Act ........................... .46 • b) The Terms of the Privacy Protection Act ................................. .47 • c) Application of the PP A to Computer Searches and Seizures ........... .48 • 3. Civil Liability Under the Electronic Communications Privacy Act ............. 51 • 4. Considering the Need for Multiple Warrants in Network Searches ............. 52 • 5. No-Knock Warrants .................................................................... 53 • 6. Sneak-and-Peek Warrants ............................................................. 54 • 7. Privileged Documents .................................................................. 55 • a) The Attorney General's Regulations Relating to Searches of. .......... Disinterested Lawyers. Physicians, and Clergymen ........................ .55 • b) Strategies for Reviewing Privileged Computer Files .....................56 • C. Drafting the Warrant and Affidavit ........................................................... 57 • Step 1: Accurately and Particularly Describe the Property to be Seized in the,,. Warrant and/or Attachments to the Warrant .......................................... .57 • Step 2: Establish Probable Cause in the Affidavit .................................... 62 • Step 3: In the Affidavit Supporting the Warrant, Include an Explanation of .. the Search Strategy (Such as the Need to Conduct an Off-site Search) as Well as the Practical and Legal Considerations That Will Govern the Execution of the Search ................................................................................... 64 • D. Post-Seizure Issues ............................................................................. ,69 • 1. Searching Computers Already in Law Enforcement Custody .................... 69 • 2. The Permissible Time Period For Examining Seized Computers ............... 70 • 3. Rule 4l(e) Motions for Return of Property ..........................................72 • III. THE ELECTRONIC COMMUNICATIONS PRIVACY ACT .................................. 74 • A. Introduction ......................................................................................74 • B. Providers of Electronic Communication Service vs. Remote Computing Service ..... 76 • C. Classifying Types of Information Held by Service Providers ............................ 80 • 1. Basic Subscriber Information Listed in 18 U.S.C. § 2703(c)(2) ................. 80 • 2. Records or Other Information Pertaining to a Customer or Subscriber ......... 81 • 3. Contents .................................................................................. 81 • D. Compelled Disclosure Under ECPA ......................................................... 82 • 1. Subpoena ................................................................................ 82 • 2. Subpoena with Prior Notice to the Subscriber or Customer ...................... 83 • 3. Section 2703(d) Order ................................................................. 84 • 4. § 2703(d) Order with Prior Notice to the Subscriber or Customer .............. 85 • 5. Search Warrant .......................................................................... 86 • E. Voluntary Disclosure ........................................................................... 87 3 • • F. Quick Reference Guide .... 00 ....... 00 .......................................................... 88 • G. Working with Network Providers: Preservation of Evidence, Preventing ... 00 ....... Disclosure to Subjects, and Cable Act Issues ....... 00 ............ 00 ............................ 89 • 1. Preservation of Evidence under 18 U.S.C. § 2703([) oo•·········oo·····oo····oo ... 90 • 2. Orders Not to Disclose the Existence of a Warrant, Subpoena................. or Court Order .............................................................................. 91 3. The Cable Act, 47 U.S.C. § 551 ....... 00 00 ........................................... 91 • H. Remedies ........................................................................................ 92 • 1. Suppression .............................................................................. 92 • 2. Civil Actions and Disclosures ......................................................... 93 • IV. ELECTRONIC SURVEILLANCE IN COMMUNICATIONS NETWORKS ................. 94 • A. Introduction ...................................................................................... 94 • B. Content vs. Addressing Information ......................................................... 94 • C. The Penffrap Statute, 18 U.S.C. §§ 3121-3127 oo .... oo ...... oooo············ ......... 00 ... 95 • D. The Wiretap Statute ("Title Ill"), 18 U.S.C. §§ 2510-2522 00.00 ............. 00 ..... 00 ... 98 • 1. Introduction: The General Prohibition ..............................................98 • 2. Key Phrases ............................................................................. 99 • 3. Exceptions to Title III ..... 00 ........... 00 ........... 00 ............. 00 ................ 101 • a) Interception Authorized by a Title ill Order, 18 U.S.C. § 2518 ....... 102 • b) Consent of a Party to the Communication, 18 U.S.C. § 2511(2)(c)(d) ......... oo•·· ........................................ 102 • c) The Provider Exception, 18 U.S.C. § 2511(2)(a)(i) ... oo ................ 104 • d)TheComputerTrespasserException. 18 U.S.C. § 2511(2)(i) ... 00 .... 108 • e) The Extension Telephone Exception. 18 U.S.C. § 2510(5)(a) ........ .108 • Q The 'Inadvertently Obtained Criminal Evidence' Exception, 18 U.S.C. § 2511(3)(b)(iv) 00 ...
Recommended publications
  • USA V. Pen Register
    Case 4:06-mj-00356 Document 13-1 Filed in TXSD on 07/19/06 Page 1 of 35 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION IN THE MATTER OF THE APPLICATION OF THE § UNITED STATES OF AMERICA FOR AN ORDER § AUTHORIZING (1) INSTALLATION AND USE OF A § PEN REGISTER AND TRAP AND TRACE DEVICE §MAGISTRATE NO. H-06-356M OR PROCESS, (2) ACCESS TO CUSTOMER § RECORDS, AND (3) CELL PHONE TRACKING § OPINION This opinion addresses two significant issues concerning law enforcement access to certain dialing and signaling information in the hands of telephone companies under the Electronic Communications Privacy Act (“ECPA”). The first is whether the Government may obtain “post- cut-through dialed digits” containing communication contents under the authority of the Pen/Trap Statute.1 The second is whether limited cell site information may be obtained prospectively under the dual or hybrid authority of the Pen/Trap Statute and the Stored Communications Act (“SCA”).2 These questions arise from a recent governmental application for a court order authorizing installation and use of a pen register and trap/trace device, access to customer records, and cell phone tracking. The court initially granted this order in part, denying access to the dialed digits as well as the limited cell site authority. In response to the Government’s informal request, the court agreed to reconsider the dialed digits ruling and invited full briefing by the Government as well as interested parties. The Electronic Frontier Foundation and Center for Democracy and Technology have filed 1 18 U.S.C.
    [Show full text]
  • An Overview of the Electronic Communications Privacy Act
    Privacy: An Overview of the Electronic Communications Privacy Act Updated October 9, 2012 Congressional Research Service https://crsreports.congress.gov R41733 Privacy: An Overview of the Electronic Communications Privacy Act Summary This report provides an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA). It also appends citations to state law in the area and the text of ECPA. It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given his prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000 (up to $500,000 for organizations); civil liability for damages, attorneys’ fees and possibly punitive damages; disciplinary action against any attorneys involved; and suppression of any derivative evidence. Congress has created separate, but comparable, protective schemes for electronic communications (e.g., email) and against the surreptitious use of telephone call monitoring practices such as pen registers and trap and trace devices. Each of these protective schemes comes with a procedural mechanism to afford limited law enforcement access to private communications and communications records under conditions consistent with the dictates of the Fourth Amendment. The government has been given narrowly confined authority to engage in electronic surveillance, conduct physical searches, and install and use pen registers and trap and trace devices for law enforcement purposes under ECPA and for purposes of foreign intelligence gathering under the Foreign Intelligence Surveillance Act.
    [Show full text]
  • Problems with Extending EINSTEIN 3 to Critical Infrastructure1
    Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure1 Steven M. Bellovin2, Scott O. Bradner3, Whitfield Diffie4, Susan Landau5, Jennifer Rexford6 1 Introduction Effectiveness should be the measure of any deployed technology. Does the solution actually solve the problem? Does it do so in a cost-efficient manner? If the solution creates new problems, are these easier and less problematic to handle than the original issue? In short, is the solution effective? In the rush to protect the U.S. after the 9/11 attacks, effectiveness was not always the primary driver in determining the value of the systems being proposed. In this context we consider the potential extension to the private sector of EINSTEIN 3, a federal program to detect and prevent cyber intrusions. Providing services to the public is a fundamental role for U.S. federal civilian agencies, and beginning in the mid 1990s, many agencies turned to the Internet. This shift was not without problems. While confidentiality, integrity, and authentication dominated early federal thinking about computer and Internet security, the threats agencies faced included phishing, IP spoofing, botnets, denials of service (DoS), distributed denials of service, and man-in-the-middle attacks. Some exploits were done purely for the publicity, but others had serious purpose behind them. By the early 2000s, the growing number of attacks on U.S. civilian agency systems could not be ignored, and in 2004 the U.S. began an active effort to protect federal civilian agencies against cyber intrusions7. This 1 The authors would like to thank Matt Blaze and John Treichler for various insights and suggestions in the writing of this paper, and we would also like to acknowledge multiple useful conversations with Sandy Bacik, Tahir El Gamal, and Vern Paxson.
    [Show full text]
  • United States Foreign Intelligence Surveillance
    All redacted information exempt under b(1) and/or b(3) except where TOP SECRETIIHCSIfCOMIPITIINOFORN otherwise noted. !'ILEO KAREN E. SUTTON, CLERK UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT U.S. Foreign lntelllgsnce Surveillance Court WASHINGTON, D.C. Docket Number: PRITT MEMORANDUM OF LAW AND FACT IN SUPPORT OF APPLICATION FOR PEN REGISTERS AND TRAP AND TRACE DEVICES FOR FOREIGN INTELLIGENCE PURPOSES TOP !lECRETlIHCSJICOl\:UNTHNOFORN Derived from Application of the United States to the Foreign Intelligence Surveillance Court in the above-captioned matt~ filed Dealassify ealy tl1'6ft the detetnhnatioll of the Pxesident. 1871 (c) (2) PRODUCT I ON JULY 2009 2405 'fell SECR£THHCS/fCOP,H~ITmIOFORN : . ! INTRODUCTION (U) One of the greatest challenges the United States faces in the ongoing conflict with_ "is finding operatives of the enemy. As the Court is aware' ,that task is complicated by terrorists' exploitation of Interne! e-mail as a favored means of communication. -- , .' TOP 8ECRET/fHC8NCOMIl'ffi'A'IOFORN 1871 (c) (2) PRODUCT I ON JULY 2009 2406 TOP SECR:ETffHCSHCOMINT/fNOFORN LI. Gen. Michael V. Hayden, USAF, Director, NSA 'If 6 I(Attaclunent A to the Application) (hereinafter "DIRNSA Dec!. "). Unless the United States finds a way to sort through that data to identify terrorists' cornmuniical:iotls, . be losing vital intelligence that could prevent another deadly terrorist attack. (TSNSlitNF) The attached Application for pen registers and trap and trace devices works within the traditional authorities provided by the Foreign Intelligence Surveillance Act to capitalize upon the unique opportunities the United States has for identifying communications 0_' The collection sought here will make possible one of the most powerful tools that the Government can bring to bear to discover enemy ,communications: meta data analYSIS.
    [Show full text]
  • Government Access to Phone Calling Activity and Related Records: Legal Authorities
    Government Access to Phone Calling Activity and Related Records: Legal Authorities (name redacted) Legislative Attorney (name redacted) Legislative Attorney November 9, 2011 Congressional Research Service 7-.... www.crs.gov RL33424 CRS Report for Congress Prepared for Members and Committees of Congress Government Access to Phone Calling Activity and Related Records: Legal Authorities Summary Public interest in the means by which the government may collect telephone call records has been raised by revelations in recent years regarding alleged intelligence activity by the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI). According to a USA Today article from May 11, 2006, the NSA allegedly sought and obtained records of telephone numbers called and received from millions of telephones within the United States from three telephone service providers; a fourth reportedly refused to provide such records. Additionally, a series of reports issued by the Department of Justice’s Office of the Inspector General (DOJ OIG), most recently in January of 2010, indicate that, between 2002 and 2006, consumer records held by telephone companies had been provided to the FBI through the use of “exigent letters” and other informal methods that fell outside of the national security letter (NSL) process embodied in statute and internal FBI policies. The Supreme Court has held that there is no Fourth Amendment protection of telephone calling records held in the hands of third party providers, where the content of any call is not intercepted. However, this report summarizes existing statutory authorities regarding access by the government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices.
    [Show full text]
  • Electronic Surveillance in a Digital Age (Part 7 of 7)
    lossary Access munication, includes any information concerning The technical capability to interface with a com- the substance, purport, or meaning of that commu- munications facility, such as a communications nication. line or switch, so that law enforcement can moni- Call Content Channel (CCC) tor and receive call setup information and call The link between the surveillance switch and the content. law enforcement agency that carries the call con- Actual Capacity tent. The CCC may be a switched connection or a That portion of the Maximum Capacity simulta- dedicated path through the Public Switched Tele- neously required to conduct electronic surveil- phone Network (PSTN), e.g., on a private line. lances at or before a specified date in a given switch as indicated by the Attorney General for all Call Data Channel (CDC) government agencies authorized to do surveil- The interface between the surveillance switch and lance. the law enforcement agency that carries the call set-up data. The CDC may be a switched connec- Advanced Intelligent Network (AIN) tion or dedicated path through the Public A system of interrelated computer-based compo- Switched Telephone Network (PSTN) or may be nents linked to a switched or wireless telecommu- separate from the PSTN, e.g., via a private line or a nications network that provides a framework for packet switched network. services, e.g., call forwarding, credit card authen- tication, personal identification numbers, speed Call Setup Data dialing, voice dialing, etc. Includes all of the setup and call release informa- tion received and interpreted by the surveillance Base Station switch as a regular part of processing the call as The common name for all of the radio equipment defined in applicable standards and specifications located at a single site for serving one or several for the services being provided.
    [Show full text]
  • Electronic Surveillance Manual
    ELECTRONIC SURVEILLANCE MANUAL PROCEDURES and CASE LAW FORMS Revised June 2005 (complete in one voliime) FOREWORD This manual was prepared by the Electronic Surveillance Unit, Office of Enforcement Operations, Criminal Division, and is designed primarily to assist federal prosecutors and investigative agents in the preparation of electronic surveillance applications made pursuant to Title 18, United States Code, Sections 2510-2522 (2001) ("Title III") and associated statutes. It is not intended to confer any rights, privileges, or benefits upon defendants, nor does it have the force of a United States Department of Justice directive. See United States v. Caceres, 440 U.S. 741 (1979). In addition to outlining and discussing the statutory requirements of Title III applications, this manual also sets forth the Department's authorization process, provides guidance in filing Title III pleadings before the court, and discusses the applicable case law as well as both novel, and frequently arising, legal issues involved in Title III litigation. Samples of the most commonly filed pleadings follow the text. INTRODUCTION This manual sets forth the procedures established by the Criminal Division of the Department of Justice to obtain authorization to conduct electronic surveillance pursuant to Title 18, United States Code, Sections 2510-2522 (2001) (Title III of the Omnibus Crime Control and Safe Streets Act of 1968, as amended by the Electronic Communications Privacy Act of 198 6 (ECPA), the Communications Assistance for Law Enforcement Act of 1994 (CALEA), the Antiterrorism and Effective Death Penalty Act of 1996 (Antiterrorism Act)), the USA-Patriot Act of 2001, and the Homeland Security Act of 2002 and discusses the statutory requirements of each of the pleadings.
    [Show full text]
  • Application An
    STATE OF NORTH CAROLINA IN THE GENERAL COURT OF JUSTICE - SUPERIOR COURT COUNTY OF COUNTY NAME DIVISION (SEALED) APPLICATION AND AFFIDAVIT FOR ORDER AUTHORIZING INSTALLATION AND MONITORING OF A PEN REGISTER AND/OR TRAP AND TRACE DEVICE, GPS AND GEO-LOCATION, AND FOR THE PRODUCTION OF RECORDS AND OTHER INFORMATION PURSUANT TO 18 USC § 3123/2703(d) AND N.C.G.S. 260-264 NOW COMES AGENT NAME, a RANK with the AGENCY NAME, and petitions the Court to authorize the installation and monitoring of a pen register and/or trap and trace device(s) by Agents of the North Carolina State Bureau of Investigation, FBI, USMS, the New Hanover County Sheriff’s Office, the Nebraska State Police, and/or USSS on the telephone service being used by TARGET NAME and subscribed to an unknown subscriber with assigned call number TARGET NUMBER (hereinafter referred to as the TARGET TELEPHONE(s), pursuant to 18 USC § 3123/2703(d) and/or N.C.G.S. § 15A-260 - 264. In support of this application, the following facts are presented: 1. That there is probable cause to believe that a felony has been committed. The nature of the criminal offense(s) is as follows: OFFENSE(S), which is in violation of North Carolina General Statute(s) NUMBER and is punishable by more than one (1) year in the State’s prison. 2. That TARGET NAME is a fugitive from justice and/or is the subject of an ongoing criminal investigation being conducted by the AGENCY NAME, and there is probable cause to believe that TARGET NAME committed the offense.
    [Show full text]
  • A Lot More Than a Pen Register, and Less Than a Wiretap
    Pell and Soghoian: A Lot More than a Pen Register, and Less than a Wiretap 1 A LOT MORE THAN A PEN REGISTER, AND LESS THAN A WIRETAP: WHAT THE STINGRAY TEACHES US ABOUT HOW CONGRESS SHOULD APPROACH THE REFORM OF LAW ENFORCEMENT SURVEILLANCE 2 AUTHORITIES Stephanie K. Pell* & Christopher Soghoian** 16 YALE J.L. & TECH. 134 (2013) ABSTRACT In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, the public learned that the NSA, since 2006, had been collecting nearly all domestic phone call detail records and other telephony metadata pursuant to a controversial, classified interpretation of Section 215 of the USA PATRIOT Act. Prior to the Snowden disclosure, the existence of this intelligence program had been kept secret from the general public, though some members of Congress knew both of its existence and of the statutory interpretation the government was using to justify the bulk collection. Unfortunately, the classified nature of the Section 215 metadata program prevented them from alerting the public directly, so they were left to convey their criticisms of the program directly to certain federal agencies as part of a non-public oversight process. The efficacy of an oversight regime burdened by such strict secrecy is now the subject of justifiably intense debate. In the context of that debate, this Article examines a very different surveillance technology—one that has been used by federal, state and local law enforcement agencies for more than two decades without invoking even the muted scrutiny Congress applied to the Section 215 metadata program.
    [Show full text]
  • Media Technology and Society
    MEDIA TECHNOLOGY AND SOCIETY Media Technology and Society offers a comprehensive account of the history of communications technologies, from the telegraph to the Internet. Winston argues that the development of new media, from the telephone to computers, satellite, camcorders and CD-ROM, is the product of a constant play-off between social necessity and suppression: the unwritten ‘law’ by which new technologies are introduced into society. Winston’s fascinating account challenges the concept of a ‘revolution’ in communications technology by highlighting the long histories of such developments. The fax was introduced in 1847. The idea of television was patented in 1884. Digitalisation was demonstrated in 1938. Even the concept of the ‘web’ dates back to 1945. Winston examines why some prototypes are abandoned, and why many ‘inventions’ are created simultaneously by innovators unaware of each other’s existence, and shows how new industries develop around these inventions, providing media products for a mass audience. Challenging the popular myth of a present-day ‘Information Revolution’, Media Technology and Society is essential reading for anyone interested in the social impact of technological change. Brian Winston is Head of the School of Communication, Design and Media at the University of Westminster. He has been Dean of the College of Communications at the Pennsylvania State University, Chair of Cinema Studies at New York University and Founding Research Director of the Glasgow University Media Group. His books include Claiming the Real (1995). As a television professional, he has worked on World in Action and has an Emmy for documentary script-writing. MEDIA TECHNOLOGY AND SOCIETY A HISTORY: FROM THE TELEGRAPH TO THE INTERNET BrianWinston London and New York First published 1998 by Routledge 11 New Fetter Lane, London EC4P 4EE Simultaneously published in the USA and Canada by Routledge 29 West 35th Street, New York, NY 10001 Routledge is an imprint of the Taylor & Francis Group This edition published in the Taylor & Francis e-Library, 2003.
    [Show full text]
  • Pdf) Files and a Copy of Adobe a Acrobat Reader 3.01 with Search Is Provided on This CD
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Publishing the Documents of the Lyon Group of Senior Experts on Transnational Crime and G8 Videoconferencing Support, Final Report Author(s): Rule of Law Foundation Document No.: 192293 Date Received: February 01, 2002 Award Number: 99-IJ-CX-0057 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. L Publishing the Documents of the Lyon Group of Senior Experts on Transnational Crime and-_ .^. ”. 4- “L -*Py- . ~ . ~ ~ ... 9~3.- G$s viaeoco~~~reiicing*$uP~~~it / I Final Report i. .- -I. ... - -- _. *... __._- .I d__II-_.. ;.- _i. .. c __ .--.-__-___ , _- Submitted by the Rule of Law Foundation To The National Institute of Justice, Ofice of Justice Programs, United States Department of Justice Grant Award 1999-IJ-CX-0057 Reporting Period: September 1,1999 to August 31,2000 PWePERPY OF National Criminal Justice Reference Service (NCJRS) a This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]
  • A Review of the FBI's Use of Pen Register and Trap and Trace Devices Under the Foreign Intelligence Surveillance Act in 2007 Through 2009
    A Review of the FBI's Use of Pen Register and Trap and Trace Devices Under the Foreign Intelligence Surveillance Act in 2007 through 2009 Executive Summary Oversight and Review Division 15-06 June 2015 EXECUTIVE SUMMARY This Executive Summary provides a brief overview of the results of the Department of Justice (Department or DOJ) Office of the Inspector General's (OIG) review of the Federal Bureau of Investigation's (FBI) use of pen registers and trap and trace devices under the Foreign Intelligence Surveillance Act (FISA) during calendar years 2007 through 2009. We completed a draft of this report in February 2014. At that time, we provided the draft report to the Department, the FBI, and the Intelligence Community to conduct factual accuracy and classification reviews. In May 2014, we circulated an updated draft report that reflected minor revisions made in response to the factual accuracy comments we received. We did not receive the final results of the classification reviews until April 2015. We provided the full classified version of this report to DOJ leadership offices, the FBI, the Office of the Director of National Intelligence, and appropriately cleared members of the relevant congressional oversight and intelligence committees. Pen registers and trap and trace devices have long been used for federal law enforcement purposes. 1 The federal criminal pen register statute was enacted in 1986 and, in 1998, Congress amended FISA to authorize the government to use pen registers to collect foreign intelligence information in national security investigations after obtaining an order from the Foreign Intelligence Surveillance Court (FISA Court).
    [Show full text]