Final Report Minnesota Telefutures Study Group

Total Page:16

File Type:pdf, Size:1020Kb

Final Report Minnesota Telefutures Study Group This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp FINAL REPORT OF THE MINNESOTA TELEFUTURES STUDY GROUP (MTSG) TO THE MINNESOTA PUBLIC UTILITIES COMMISSION November 19, 1993 TABLE OF CONTENTS Executive Summary i-iii Section I: Introduction. ............................................................................ 1 A. Objectives 2 B. Infrastructure Development Activities Around the Nation 3 C. Representative State Experiences 4 Tennessee .4 New York and Michigan 5 Illinois 5 New Jersey 5 Summary of State Experiences 6 D. Telecommunications Industry Survey.......................................... 6 E. Current Status of the Telecommunications Network in Minnesota....... 7 Section II: Short Term Goals 11 A. Digital Switching and Digital Interoffice Facilities 12 B. Local Service Attributes....................................................... 17 1. Single Party Service 17 2. Touchtone Service 18 3. Custom Calling Features 19 4. Equal Access 20 Section III: Intermediate Goals 25 A. Signalling System 7 25 B. Integrated Services Digital Network (ISDN) 30 C. Custom Local Area Signalling Services (CLASS) 34 Section IV: Long Term Goals 39 A. Description of a Broadband Infrastructure.................................... 39 1. What is Broadband? 39 2. Components of a Broadband Infrastructure 41 a. Distribution Alternatives 41 b. Switching 48 c. Interoffice Facilities 49 d. Signalling 50 e. Customer Premises Equipment.. 50 3. Summary 50 B. Broadband Services/Applications............................................... 52 1. Current and Potential Services 52 2. Current and Potential Applications.................................... 53 C. Broadband Benefits 54 1. Customer Benefits of Broadband 54 2. Social Benefits of Broadband 60 3. Characteristics of Current and Future Demand 61 4. Broadband Costs and Risks 62 D. Participants (Competitors/Co-Providers) in the Building of a Broadband Infrastructure (Examples) 63 1. Telephone Companies 64 2. Cable Television Companies 65 3. Interexchange Carriers................................................... 66 4. Competitive Access Providers 66 5. Computing Networks 66 E. Broadband Infrastructure Deployment Scenarios 67 1. Scenarios for Broadband Deployment 68 a. Build It and They Will Come Scenario 68 b. Market Demand/Deployment Scenario 70 c. Industry/Public Joint Action Scenario 71 F. Wireless Infrastructure Deployment............................................ 73 G. Potential Regulatory Issues 77 Section V: Summary of Recommendations 79 Appendices 85-183 Appendix I: MTSG Members 85 Appendix II: MTSG Charter. 91 Appendix III: Bibliography. ... .... ........................................ 95 Appendix IV: MTSG Survey 99 Appendix V: Network Requirements 109 Appendix VI: CLASS Order 113 Appendix VII: Detailed Description of CLASS Features 131 Appendix VIII: SONET Graphics 137 Appendix IX: ATM Graphics 143 Appendix X: Education Graphics 157 Appendix XI: Cellular Coverage in Minnesota 165 Appendix XII: MTA and BTAs for Minnesota 169 Appendix XIII: Glossary.. .. .... .............. .......... .. ................ ...... 173 EXECUTIVE SUMMARY BACKGROUND - The Minnesota Telefutures Study Group (MTSG) was fonned in 1990 at the request of the Minnesota Public Utilities Commission (Commission). Its purpose was to describe the telecommunications infrastructure required to further enhance Minnesota's leadership in telecommunications beyond the year 2000 and to develop a comprehensive set of recommendations, including industry and government actions, required to further position the State's telecommunications industry to deliver the latest enhanced telecommunications services required by the citizens of Minnesota. The study group was composed of representatives from the telecommunications industry, state agencies, public interest and customer groups. The MTSG surveyed and analyzed the telecommunications infrastructure activities of some thirty other states, as well as industry initiatives and general infonnation and data on the subject. This report contains the [mdings of the MTSG and its recommendations to the Minnesota Public Utilities Commission. ACTIVITIES OF OTHER STATES The MTSG found several objectives that were consistent throughout the various state plans they reviewed, including digital switching and fiber optic transmission facilities; redefinition of universal service to include technological advancements; examination of regulatory policies and practices; utilization of telecommunications to deliver educational, medical and government services more efficiently; promotion of telecommuting; facilitation of economic development opportunities through business cost reductions via telecommunications; and preparation of a detailed inventory of the existing telecommunications infrastructure. The different approaches to infrastructure and alternative regulatory policies examined by the MTSG have been introduced into various jurisdictions in recent years. The MTSG believes that it is premature to conclude that any single approach provides superior results. INDUSTRY SURVEY/MINNESOTA NETWORK CURRENT STATUS To detennine the current status of the network and local exchange carriers' (LECs') future infrastructure plans, the MTSG surveyed all Minnesota LECs in late 1991. Respondents serve 96 percent of all Minnesota access lines. Alternative data sources were reviewed, and those companies serving the remaining four percent of access lines were contacted, to complete the survey. The survey addressed services that the MTSG believes are most important to the development of a modem telecommunications infrastructure, including planned investment in facilities and systems. The current telecommunications network in Minnesota consists of 94 local exchange companies, approximately 100 long distance companies, one local exchange competitor, and about 900 payphone companies. The local exchange carriers vary in size from 1. 8 million access lines in 122 exchanges to 36 access lines in one exchange. The quality of service of even the smallest local companies in Minnesota is among the best and 70 percent of the State's access lines are served by a digital switching vehicle. Currently, 89 percent of all trunking facilities in Minnesota carry digital transmission and over two-thirds of the interoffice facilities are fiber. ESTABLISHMENT OF MTSG GOALS The MTSG developed short term, intermediate and long term goals for the provision of specific facilities and services that it believes are essential for an advanced telecommunications infrastructure in Minnesota. Phased goals were adopted in order to establish workable and achievable target dates for the study group's recommendations. The short term goals include ubiquitous availability of the following by 1998: digitally switched access lines, digital interoffice facilities, single party service, touchtone calling, custom calling features, and interLATA equal access. The intermediate goals cover Signalling System 7 (SS7), Integrated Services Digital Network (ISDN) and Custom Local Area Signalling Services (CLASS). SS7 is the next generation of signalling, providing out-of-band signalling which allows for more signalling information, fraud reduction and the opportunity for new service offerings. ISDN is a digital architecture that allows for an integrated voice/data capability over the end user loop facility. CLASS is an enhanced offering of nine central office based services and is available in offices equipped to provide these services. The long term goal is deployment of a broadband network capable of supporting advanced services as dictated by market demand, competition, and technology development. Full evolution may take two decades due to evolving standards and technology. Current expected costs of deployment, excluding loop electronics, may range from $4,800 to $23,100 per access line. These goals, and the technologies they encompass, are described in detail in thisreport, as are the associated applications and benefits. Potential regulatory issues related to the long term goal are also discussed. RECOMMENDATIONS The MTSG unanimously adopted the following recommendations: Short Term • All exchanges must be served by digital switches by January 1, 1998. II All exchanges must be interconnected by digital interexchange facilities by January 1, 1998. ~ All providers of basic local service must offer single party lines to customers upon request by January 1, 1995. ~ All providers of basic local service must equip all lines with touchtone and provide touchtone to all subscribers without separate charge by January 1, 1995. All providers of basic local service must offer basic custom calling features to all subscribers by January 1, 1998. All subscribers should have access to multiple long distance providers on a presubscribed (l +) basis for interLATA calls by January 1, 1998. An intraLATA equal access recommendation was deferred pending the current docket before the Commission. Intermediate ~ SS? trunk signalling for call set up should be deployed ubiquitously throughout the State by the year 2000. Information on ISDN features and availability should be provided, with further deployment and penetration in the State left to customer demand and individual company offering. In extended area service (EAS) markets, where one of the exchanges obtains CLASS services, the exchanges with EAS to that exchange should also obtain CLASS services within three
Recommended publications
  • USA V. Pen Register
    Case 4:06-mj-00356 Document 13-1 Filed in TXSD on 07/19/06 Page 1 of 35 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION IN THE MATTER OF THE APPLICATION OF THE § UNITED STATES OF AMERICA FOR AN ORDER § AUTHORIZING (1) INSTALLATION AND USE OF A § PEN REGISTER AND TRAP AND TRACE DEVICE §MAGISTRATE NO. H-06-356M OR PROCESS, (2) ACCESS TO CUSTOMER § RECORDS, AND (3) CELL PHONE TRACKING § OPINION This opinion addresses two significant issues concerning law enforcement access to certain dialing and signaling information in the hands of telephone companies under the Electronic Communications Privacy Act (“ECPA”). The first is whether the Government may obtain “post- cut-through dialed digits” containing communication contents under the authority of the Pen/Trap Statute.1 The second is whether limited cell site information may be obtained prospectively under the dual or hybrid authority of the Pen/Trap Statute and the Stored Communications Act (“SCA”).2 These questions arise from a recent governmental application for a court order authorizing installation and use of a pen register and trap/trace device, access to customer records, and cell phone tracking. The court initially granted this order in part, denying access to the dialed digits as well as the limited cell site authority. In response to the Government’s informal request, the court agreed to reconsider the dialed digits ruling and invited full briefing by the Government as well as interested parties. The Electronic Frontier Foundation and Center for Democracy and Technology have filed 1 18 U.S.C.
    [Show full text]
  • An Overview of the Electronic Communications Privacy Act
    Privacy: An Overview of the Electronic Communications Privacy Act Updated October 9, 2012 Congressional Research Service https://crsreports.congress.gov R41733 Privacy: An Overview of the Electronic Communications Privacy Act Summary This report provides an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA). It also appends citations to state law in the area and the text of ECPA. It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given his prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000 (up to $500,000 for organizations); civil liability for damages, attorneys’ fees and possibly punitive damages; disciplinary action against any attorneys involved; and suppression of any derivative evidence. Congress has created separate, but comparable, protective schemes for electronic communications (e.g., email) and against the surreptitious use of telephone call monitoring practices such as pen registers and trap and trace devices. Each of these protective schemes comes with a procedural mechanism to afford limited law enforcement access to private communications and communications records under conditions consistent with the dictates of the Fourth Amendment. The government has been given narrowly confined authority to engage in electronic surveillance, conduct physical searches, and install and use pen registers and trap and trace devices for law enforcement purposes under ECPA and for purposes of foreign intelligence gathering under the Foreign Intelligence Surveillance Act.
    [Show full text]
  • Problems with Extending EINSTEIN 3 to Critical Infrastructure1
    Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure1 Steven M. Bellovin2, Scott O. Bradner3, Whitfield Diffie4, Susan Landau5, Jennifer Rexford6 1 Introduction Effectiveness should be the measure of any deployed technology. Does the solution actually solve the problem? Does it do so in a cost-efficient manner? If the solution creates new problems, are these easier and less problematic to handle than the original issue? In short, is the solution effective? In the rush to protect the U.S. after the 9/11 attacks, effectiveness was not always the primary driver in determining the value of the systems being proposed. In this context we consider the potential extension to the private sector of EINSTEIN 3, a federal program to detect and prevent cyber intrusions. Providing services to the public is a fundamental role for U.S. federal civilian agencies, and beginning in the mid 1990s, many agencies turned to the Internet. This shift was not without problems. While confidentiality, integrity, and authentication dominated early federal thinking about computer and Internet security, the threats agencies faced included phishing, IP spoofing, botnets, denials of service (DoS), distributed denials of service, and man-in-the-middle attacks. Some exploits were done purely for the publicity, but others had serious purpose behind them. By the early 2000s, the growing number of attacks on U.S. civilian agency systems could not be ignored, and in 2004 the U.S. began an active effort to protect federal civilian agencies against cyber intrusions7. This 1 The authors would like to thank Matt Blaze and John Treichler for various insights and suggestions in the writing of this paper, and we would also like to acknowledge multiple useful conversations with Sandy Bacik, Tahir El Gamal, and Vern Paxson.
    [Show full text]
  • United States Foreign Intelligence Surveillance
    All redacted information exempt under b(1) and/or b(3) except where TOP SECRETIIHCSIfCOMIPITIINOFORN otherwise noted. !'ILEO KAREN E. SUTTON, CLERK UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT U.S. Foreign lntelllgsnce Surveillance Court WASHINGTON, D.C. Docket Number: PRITT MEMORANDUM OF LAW AND FACT IN SUPPORT OF APPLICATION FOR PEN REGISTERS AND TRAP AND TRACE DEVICES FOR FOREIGN INTELLIGENCE PURPOSES TOP !lECRETlIHCSJICOl\:UNTHNOFORN Derived from Application of the United States to the Foreign Intelligence Surveillance Court in the above-captioned matt~ filed Dealassify ealy tl1'6ft the detetnhnatioll of the Pxesident. 1871 (c) (2) PRODUCT I ON JULY 2009 2405 'fell SECR£THHCS/fCOP,H~ITmIOFORN : . ! INTRODUCTION (U) One of the greatest challenges the United States faces in the ongoing conflict with_ "is finding operatives of the enemy. As the Court is aware' ,that task is complicated by terrorists' exploitation of Interne! e-mail as a favored means of communication. -- , .' TOP 8ECRET/fHC8NCOMIl'ffi'A'IOFORN 1871 (c) (2) PRODUCT I ON JULY 2009 2406 TOP SECR:ETffHCSHCOMINT/fNOFORN LI. Gen. Michael V. Hayden, USAF, Director, NSA 'If 6 I(Attaclunent A to the Application) (hereinafter "DIRNSA Dec!. "). Unless the United States finds a way to sort through that data to identify terrorists' cornmuniical:iotls, . be losing vital intelligence that could prevent another deadly terrorist attack. (TSNSlitNF) The attached Application for pen registers and trap and trace devices works within the traditional authorities provided by the Foreign Intelligence Surveillance Act to capitalize upon the unique opportunities the United States has for identifying communications 0_' The collection sought here will make possible one of the most powerful tools that the Government can bring to bear to discover enemy ,communications: meta data analYSIS.
    [Show full text]
  • Government Access to Phone Calling Activity and Related Records: Legal Authorities
    Government Access to Phone Calling Activity and Related Records: Legal Authorities (name redacted) Legislative Attorney (name redacted) Legislative Attorney November 9, 2011 Congressional Research Service 7-.... www.crs.gov RL33424 CRS Report for Congress Prepared for Members and Committees of Congress Government Access to Phone Calling Activity and Related Records: Legal Authorities Summary Public interest in the means by which the government may collect telephone call records has been raised by revelations in recent years regarding alleged intelligence activity by the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI). According to a USA Today article from May 11, 2006, the NSA allegedly sought and obtained records of telephone numbers called and received from millions of telephones within the United States from three telephone service providers; a fourth reportedly refused to provide such records. Additionally, a series of reports issued by the Department of Justice’s Office of the Inspector General (DOJ OIG), most recently in January of 2010, indicate that, between 2002 and 2006, consumer records held by telephone companies had been provided to the FBI through the use of “exigent letters” and other informal methods that fell outside of the national security letter (NSL) process embodied in statute and internal FBI policies. The Supreme Court has held that there is no Fourth Amendment protection of telephone calling records held in the hands of third party providers, where the content of any call is not intercepted. However, this report summarizes existing statutory authorities regarding access by the government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices.
    [Show full text]
  • Electronic Surveillance in a Digital Age (Part 7 of 7)
    lossary Access munication, includes any information concerning The technical capability to interface with a com- the substance, purport, or meaning of that commu- munications facility, such as a communications nication. line or switch, so that law enforcement can moni- Call Content Channel (CCC) tor and receive call setup information and call The link between the surveillance switch and the content. law enforcement agency that carries the call con- Actual Capacity tent. The CCC may be a switched connection or a That portion of the Maximum Capacity simulta- dedicated path through the Public Switched Tele- neously required to conduct electronic surveil- phone Network (PSTN), e.g., on a private line. lances at or before a specified date in a given switch as indicated by the Attorney General for all Call Data Channel (CDC) government agencies authorized to do surveil- The interface between the surveillance switch and lance. the law enforcement agency that carries the call set-up data. The CDC may be a switched connec- Advanced Intelligent Network (AIN) tion or dedicated path through the Public A system of interrelated computer-based compo- Switched Telephone Network (PSTN) or may be nents linked to a switched or wireless telecommu- separate from the PSTN, e.g., via a private line or a nications network that provides a framework for packet switched network. services, e.g., call forwarding, credit card authen- tication, personal identification numbers, speed Call Setup Data dialing, voice dialing, etc. Includes all of the setup and call release informa- tion received and interpreted by the surveillance Base Station switch as a regular part of processing the call as The common name for all of the radio equipment defined in applicable standards and specifications located at a single site for serving one or several for the services being provided.
    [Show full text]
  • Electronic Surveillance Manual
    ELECTRONIC SURVEILLANCE MANUAL PROCEDURES and CASE LAW FORMS Revised June 2005 (complete in one voliime) FOREWORD This manual was prepared by the Electronic Surveillance Unit, Office of Enforcement Operations, Criminal Division, and is designed primarily to assist federal prosecutors and investigative agents in the preparation of electronic surveillance applications made pursuant to Title 18, United States Code, Sections 2510-2522 (2001) ("Title III") and associated statutes. It is not intended to confer any rights, privileges, or benefits upon defendants, nor does it have the force of a United States Department of Justice directive. See United States v. Caceres, 440 U.S. 741 (1979). In addition to outlining and discussing the statutory requirements of Title III applications, this manual also sets forth the Department's authorization process, provides guidance in filing Title III pleadings before the court, and discusses the applicable case law as well as both novel, and frequently arising, legal issues involved in Title III litigation. Samples of the most commonly filed pleadings follow the text. INTRODUCTION This manual sets forth the procedures established by the Criminal Division of the Department of Justice to obtain authorization to conduct electronic surveillance pursuant to Title 18, United States Code, Sections 2510-2522 (2001) (Title III of the Omnibus Crime Control and Safe Streets Act of 1968, as amended by the Electronic Communications Privacy Act of 198 6 (ECPA), the Communications Assistance for Law Enforcement Act of 1994 (CALEA), the Antiterrorism and Effective Death Penalty Act of 1996 (Antiterrorism Act)), the USA-Patriot Act of 2001, and the Homeland Security Act of 2002 and discusses the statutory requirements of each of the pleadings.
    [Show full text]
  • Application An
    STATE OF NORTH CAROLINA IN THE GENERAL COURT OF JUSTICE - SUPERIOR COURT COUNTY OF COUNTY NAME DIVISION (SEALED) APPLICATION AND AFFIDAVIT FOR ORDER AUTHORIZING INSTALLATION AND MONITORING OF A PEN REGISTER AND/OR TRAP AND TRACE DEVICE, GPS AND GEO-LOCATION, AND FOR THE PRODUCTION OF RECORDS AND OTHER INFORMATION PURSUANT TO 18 USC § 3123/2703(d) AND N.C.G.S. 260-264 NOW COMES AGENT NAME, a RANK with the AGENCY NAME, and petitions the Court to authorize the installation and monitoring of a pen register and/or trap and trace device(s) by Agents of the North Carolina State Bureau of Investigation, FBI, USMS, the New Hanover County Sheriff’s Office, the Nebraska State Police, and/or USSS on the telephone service being used by TARGET NAME and subscribed to an unknown subscriber with assigned call number TARGET NUMBER (hereinafter referred to as the TARGET TELEPHONE(s), pursuant to 18 USC § 3123/2703(d) and/or N.C.G.S. § 15A-260 - 264. In support of this application, the following facts are presented: 1. That there is probable cause to believe that a felony has been committed. The nature of the criminal offense(s) is as follows: OFFENSE(S), which is in violation of North Carolina General Statute(s) NUMBER and is punishable by more than one (1) year in the State’s prison. 2. That TARGET NAME is a fugitive from justice and/or is the subject of an ongoing criminal investigation being conducted by the AGENCY NAME, and there is probable cause to believe that TARGET NAME committed the offense.
    [Show full text]
  • A Lot More Than a Pen Register, and Less Than a Wiretap
    Pell and Soghoian: A Lot More than a Pen Register, and Less than a Wiretap 1 A LOT MORE THAN A PEN REGISTER, AND LESS THAN A WIRETAP: WHAT THE STINGRAY TEACHES US ABOUT HOW CONGRESS SHOULD APPROACH THE REFORM OF LAW ENFORCEMENT SURVEILLANCE 2 AUTHORITIES Stephanie K. Pell* & Christopher Soghoian** 16 YALE J.L. & TECH. 134 (2013) ABSTRACT In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, the public learned that the NSA, since 2006, had been collecting nearly all domestic phone call detail records and other telephony metadata pursuant to a controversial, classified interpretation of Section 215 of the USA PATRIOT Act. Prior to the Snowden disclosure, the existence of this intelligence program had been kept secret from the general public, though some members of Congress knew both of its existence and of the statutory interpretation the government was using to justify the bulk collection. Unfortunately, the classified nature of the Section 215 metadata program prevented them from alerting the public directly, so they were left to convey their criticisms of the program directly to certain federal agencies as part of a non-public oversight process. The efficacy of an oversight regime burdened by such strict secrecy is now the subject of justifiably intense debate. In the context of that debate, this Article examines a very different surveillance technology—one that has been used by federal, state and local law enforcement agencies for more than two decades without invoking even the muted scrutiny Congress applied to the Section 215 metadata program.
    [Show full text]
  • Media Technology and Society
    MEDIA TECHNOLOGY AND SOCIETY Media Technology and Society offers a comprehensive account of the history of communications technologies, from the telegraph to the Internet. Winston argues that the development of new media, from the telephone to computers, satellite, camcorders and CD-ROM, is the product of a constant play-off between social necessity and suppression: the unwritten ‘law’ by which new technologies are introduced into society. Winston’s fascinating account challenges the concept of a ‘revolution’ in communications technology by highlighting the long histories of such developments. The fax was introduced in 1847. The idea of television was patented in 1884. Digitalisation was demonstrated in 1938. Even the concept of the ‘web’ dates back to 1945. Winston examines why some prototypes are abandoned, and why many ‘inventions’ are created simultaneously by innovators unaware of each other’s existence, and shows how new industries develop around these inventions, providing media products for a mass audience. Challenging the popular myth of a present-day ‘Information Revolution’, Media Technology and Society is essential reading for anyone interested in the social impact of technological change. Brian Winston is Head of the School of Communication, Design and Media at the University of Westminster. He has been Dean of the College of Communications at the Pennsylvania State University, Chair of Cinema Studies at New York University and Founding Research Director of the Glasgow University Media Group. His books include Claiming the Real (1995). As a television professional, he has worked on World in Action and has an Emmy for documentary script-writing. MEDIA TECHNOLOGY AND SOCIETY A HISTORY: FROM THE TELEGRAPH TO THE INTERNET BrianWinston London and New York First published 1998 by Routledge 11 New Fetter Lane, London EC4P 4EE Simultaneously published in the USA and Canada by Routledge 29 West 35th Street, New York, NY 10001 Routledge is an imprint of the Taylor & Francis Group This edition published in the Taylor & Francis e-Library, 2003.
    [Show full text]
  • Pdf) Files and a Copy of Adobe a Acrobat Reader 3.01 with Search Is Provided on This CD
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Publishing the Documents of the Lyon Group of Senior Experts on Transnational Crime and G8 Videoconferencing Support, Final Report Author(s): Rule of Law Foundation Document No.: 192293 Date Received: February 01, 2002 Award Number: 99-IJ-CX-0057 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. L Publishing the Documents of the Lyon Group of Senior Experts on Transnational Crime and-_ .^. ”. 4- “L -*Py- . ~ . ~ ~ ... 9~3.- G$s viaeoco~~~reiicing*$uP~~~it / I Final Report i. .- -I. ... - -- _. *... __._- .I d__II-_.. ;.- _i. .. c __ .--.-__-___ , _- Submitted by the Rule of Law Foundation To The National Institute of Justice, Ofice of Justice Programs, United States Department of Justice Grant Award 1999-IJ-CX-0057 Reporting Period: September 1,1999 to August 31,2000 PWePERPY OF National Criminal Justice Reference Service (NCJRS) a This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]
  • A Review of the FBI's Use of Pen Register and Trap and Trace Devices Under the Foreign Intelligence Surveillance Act in 2007 Through 2009
    A Review of the FBI's Use of Pen Register and Trap and Trace Devices Under the Foreign Intelligence Surveillance Act in 2007 through 2009 Executive Summary Oversight and Review Division 15-06 June 2015 EXECUTIVE SUMMARY This Executive Summary provides a brief overview of the results of the Department of Justice (Department or DOJ) Office of the Inspector General's (OIG) review of the Federal Bureau of Investigation's (FBI) use of pen registers and trap and trace devices under the Foreign Intelligence Surveillance Act (FISA) during calendar years 2007 through 2009. We completed a draft of this report in February 2014. At that time, we provided the draft report to the Department, the FBI, and the Intelligence Community to conduct factual accuracy and classification reviews. In May 2014, we circulated an updated draft report that reflected minor revisions made in response to the factual accuracy comments we received. We did not receive the final results of the classification reviews until April 2015. We provided the full classified version of this report to DOJ leadership offices, the FBI, the Office of the Director of National Intelligence, and appropriately cleared members of the relevant congressional oversight and intelligence committees. Pen registers and trap and trace devices have long been used for federal law enforcement purposes. 1 The federal criminal pen register statute was enacted in 1986 and, in 1998, Congress amended FISA to authorize the government to use pen registers to collect foreign intelligence information in national security investigations after obtaining an order from the Foreign Intelligence Surveillance Court (FISA Court).
    [Show full text]