Crowdsourcing Law Enforcement
from the first-10-callers-to-identify-this-fugitive... dept
In a move that seems calculated to evoke the film adaptation of 1984, the FBI has announced a plan to begin using some 150 Clear Channel digital billboards in major American cities to show national security alerts, information about recent crimes, and photographs of fugitive criminals and missing persons, all with real-time updates.A pilot billboard in Philadelphia has already helped to capture several wanted criminals, and a spokesman for the outdoor advertising industry suggests that these kinds of publicity tactics can be as useful at demoralizing criminals as they are at generating tips:
"What law enforcement tells us is it contributes to an environment where the criminal feels they have no where to go. A lot of times they end up just giving up."
In a way, the surprising thing is that law enforcement officials hadn't previously taken such visible steps to make use of the distributed eyes and ears of ordinary citizens. The problem, of course, is that publicity can also generate lots of time-consuming false leads. An advertisement currently ubiquitous on New York subways applauds the thousands of New Yorkers who phoned in reports of suspicious packages in the past year. But since we haven't heard reports of thousands of bombs recovered on the A train, it seems safe to surmise that the noise-to-signal ratio on such tips is quite high. As for national security alerts, our experience with color-coded national security warnings, and the attendant spectacle of panicked citizens mobbing Home Depot for plastic sheeting and duct tape, suggest that the Bureau might be well advised to exercise a bit of circumspection about those real-time updates.
Filed Under: billboards, criminals, crowdsourcing, fbi
FBI Apparently Believes That Court Orders Are For Suckers
from the data-mining-the-FBI dept
Wired's invaluable Ryan Singel has been panning for gold in the muddy stream of FBI e-mails and other documents recently obtained by the Electronic Frontier Foundation under a Freedom of Information Act request, and has already hit a couple of intriguing nuggets, such as overeager agents' willingness to bypass court-order requirements when seeking cell phone records. The documents reveal how this caused tension and dispute even within the Bureau.One e-mail, from a tech specialist in the FBI's Minneapolis office, complained that other agents would even pose as that specialist when calling telecom carriers, hoping to persuade them to turn over cell records without a judge's order. The cell information would apparently then be used as part of a high-tech tracking program that allowed agents to pinpoint a cell user's location.
Equally intriguing is the report that the Bureau's national-security wiretapping software recorded almost 28 million "session" intercepts in 2006. While it's not clear precisely what counts as a "session," this is obviously vastly more than the 2,176 FISA warrants (pdf) obtained by the government that year, at least some of which only covered physical searches. Unless terror suspects talk on the phone far more than the average teenager, the discrepancy hints that each warrant may have covered a very large number of individuals.
Filed Under: domestic spying, fbi, warrants
Companies: fbi
Hushmail Turns Out To Not Be Quite So Hush Hush
from the privacy-is-an-illusion dept
Many people are familiar with the company Hushmail, who provides encrypted web-based email that the company claims is completely private. In fact, the company makes it clear: "not even a Hushmail employee with access to our servers can read your encrypted e-mail, since each message is uniquely encoded before it leaves your computer." It turns out that isn't quite true. Wired reports that Hushmail handed the feds 12 CDs worth of plain text emails from the service following a court order. The Wired piece goes into great detail concerning what happened here -- and the folks at Hushmail were quite honest about how their service works. Hushmail has two different versions, one which requires a java app to be downloaded, which handles all the encryption locally. The other, more popular one, is entirely web-based, meaning that your passphrase is stored on the server ever so briefly -- and that's how Hushmail was able to access the accounts required in the court order. So, while it's true that Hushmail is mostly secure outside of a court order, the marketing material on the site is at least a little misleading, implying that even in such cases, your email will be encrypted.Filed Under: drug dealers, email, encryption, fbi, privacy
Companies: fbi, hushmail
Spying Goes All 2.0
from the pssst,-slip-me-some-ajax-in-the-dead-drop dept
While the US intelligence community has a long history of expensively botched computer systems, it does seem like they've suddenly became Web 2.0 believers. Last year we wrote about the internal Wikipedia-like offering called Intellipedia, that would let members from different agencies in the intelligence community share information more easily. It appears that things have progressed beyond that as well. They now have a social networking app just for the intelligence community, called A-Space, along with a del.icio.us clone and internal blogs. Of course, it seems like some in the intelligence arena (especially those who happen to be undercover) aren't entirely thrilled with the concept -- but it will be interesting to find out how it develops (as if we'll ever find out). What would be really nice to know is how much these efforts are costing compared to the $600 million that was thrown away on useless computer systems.Filed Under: cia, fbi, intelligence community, social networking, web 2.0
Companies: cia, facebook, fbi, myspace