You have reached your limit of free articles this month.

Enjoy unlimited access to SpringfieldNewsSun.com

Starting at just 99¢ for 8 weeks.

GREAT REASONS TO SUBSCRIBE TODAY!

  • IN-DEPTH REPORTING
  • INTERACTIVE STORYTELLING
  • NEW TOPICS & COVERAGE
  • ePAPER
X

You have read of premium articles.

Get unlimited access to all of our breaking news, in-depth coverage and interactive features. Starting at just 99c for 8 weeks.

X

Welcome to SpringfieldNewsSun.com

Your source for Clark and Champaign counties’ hometown news. All readers have free access to a limited number of stories every month.

If you are a News-Sun subscriber, please take a moment to login for unlimited access.

Privacy at issue in snooping cases

Concerns raised over laws that let agencies seize records without a search warrant.


Law enforcement can potentially spy on the American people without their knowledge or an oversight from a judge thanks to antiquated laws that privacy advocates say haven’t kept pace with technology advances.

“We haven’t had a wide-scale change in our privacy laws since the 1980s, and imagine where we were with technology back then compared to today,” said Mike Brickner, director of communications and public policy for the ACLU of Ohio.

Government agencies don’t need search warrants in many cases to obtain people’s private e-mails, electronic messages and cell phone records. Instead, they can acquire the records through subpoenas, which require less strict standards of evidence.

Law enforcement is increasingly using its subpoena power on social media providers like Google to obtain information on users during criminal investigations. The reporting requirements are such that average Americans may never know they are being snooped on unless the surveillance results in criminal charges.

The U.S. Department of Justice used subpoenas to secretly seize phone records of editors and reporters from the Associated Press, allegedly as part of a leak investigation, without first getting a warrant from a judge. Critics said the amount of information the government collected was “harassingly broad” and unconstitutional.

“I am confident our members are outraged and concerned about the targeting of journalists by the Justice Department without prior knowledge, advance warning or the approval of a judge,” said Dennis Hetzel, executive director of the Ohio Newspaper Association.

The Justice Department also sought emails in a leak investigation involving Fox News reporter James Rosen, though in that case the department filed an affidavit for a search warrant, which does require judicial approval.

Information obtained from subpoenas has helped local authorities catch dangerous criminals. Cellular records helped prove that a murder suspect’s alibi was a lie, and Internet subscriber records have helped identify sex offenders.

But privacy advocates said the government too easily can access many personal communications and other private information without sufficient probable cause. They are calling on Congress to stop the so-called warrantless snooping by updating digital privacy laws to account for the rise of cell phones, social media and e-mail.

Different rules

Warrants are necessary to wiretap phones and listen in on conversations as part of the Fourth Amendment’s protections against unreasonable searches and seizures. Authorities usually also need a warrant to seize letters sent through the mail.

But different rules apply to digital communications, even though e-mails and texts have replaced letters as the primary forms of written communication.

Under the 1986 Electronic Communications Privacy Act, the government does not need a warrant to obtain e-mails and electronic messages that are 180 days old or that have been opened, experts said.

“The statute says that only a subpoena is necessary,” said Paul Rosenzweig, a visiting fellow with the Heritage Foundation, a conservative think tank in Washington, D.C.

Subpoenas have become a go-to investigative tool because they can be written out in a prosecutor’s office without anyone’s review, Rosenzweig said.

“It is very rare that investigators will jump through the hoops that you need to go through to get a wiretap order — which requires a fairly high standard — when they can get e-mail and other stored records much more easily,” said Julian Sanchez, research fellow with the Washington-based Cato Institute, which seeks to advance limited government and individual liberty. “The records are subject to an almost trivial standard of evidence, which is relevance to an investigation.”

How the information is used depends on what the government finds.

“If your e-mail is lawfully acquired, anything disclosed in the e-mail can be used by the government,” Rosenzweig said. “If they solicit your e-mails because they think you are a drug dealer, and it turns out they are wrong but you have e-mails about undisclosed income you have in the Cayman Islands, they will take copies and send them to the IRS.”

It is unknown how often government agencies obtain personal e-mails or information about e-mail users as part of investigations.

Social media

Only a small fraction of government requests for electronic records is subject to reporting requirements, experts said. As a result, the scope of the snooping is largely a mystery.

But in the last six months of 2012, Google — which offers e-mail, video chat and instant messaging through its Gmail service — said it received 8,438 requests for user information from U.S. law enforcement agencies. About 70 percent of requests were subpoenas, while about 22 percent were probable-cause warrants.

Google, Microsoft and some other major companies said they will not release the contents of subscribers’ e-mails and electronic messages unless they receive a warrant. Google, however, reported producing other noncontent subscriber information in almost 90 percent of the law enforcement requests.

Microsoft, which owns Hotmail, said last year it provided subscriber and transactional data in two-thirds of the 11,000 requests from U.S. law enforcement it received. In 14 percent of the requests, Microsoft produced the content of e-mails.

Transactional information can include who sent and received messages, when they were delivered and possibly the location where they were transmitted. Such information is invaluable in many law enforcement investigations.

Prosecutors in New York subpoenaed Twitter for tweets, IP addresses and other information of an Occupy Wall Street protester who was charged with disorderly conduct for marching on the roadway of the Brooklyn Bridge.

Twitter fought the subpoena in court but eventually turned the information over, said Thaddeus Hoffmeister, law professor with the University of Dayton School of Law.

“Twitter fought them a little, but generally social media providers roll over and give your stuff up,” he said. “They don’t want the government to step in and regulate them more heavily.”

Subpoenas don’t always produce the contents of e-mails, but they can reveal other information useful to law enforcement.

The Ohio Bureau of Criminal Identification subpoenaed AT&T Internet Services to identify a Beavercreek man who owned an IP address associated with child pornography.

The man’s home was searched, and he was arrested and convicted of multiple felonies.

Cell phones

Government agencies also can acquire cell phone and text message records through subpoenas, which can include geolocation data showing where the phones were at certain times.

That, too, can be a case-solver for police.

In 2010, Trotwood police subpoenaed records from Cincinnati Bell that showed a murder suspect had lied about his whereabouts at the time of the homicide.

The suspect claimed to be in Kettering when the victim was killed in Trotwood.

But wireless records showed his cell phone signals were transmitted by towers near Trotwood around the time of the killing.

Cincinnati Bell said it does not know how often it receives subpoenas and other requests for information. But the company said it follows strict procedures when responding to the requests.

“Requests from law enforcement or subpoenas by the courts are handled by the office of our corporate counsel to ensure that we’re complying with all applicable laws in this area,” said Angela Ginty, spokeswoman for Cincinnati Bell.

In 2011, federal, state and local law enforcement agencies made about 1.3 million requests to some of the largest U.S. cellular providers for the wireless device records of customers, according to information obtained and released last year by Rep. Edward Markey, D-Mass.

The requests from law enforcement asked for information including geolocation, call records, content of text messages and wiretaps.

AT&T received 131,400 subpoenas for cellular records in 2011, more than double what it received in 2008, according to a letter from the company. It also received 49,700 warrants and orders in 2011.

Many U.S. law enforcement agencies are tracking cell phones without warrants and demonstrating probable cause, according to an ACLU analysis of documents from about 250 police departments.

Additionally, people whose phone and e-mail records are obtained and scrutinized by the government will likely not find out about the intrusion if they are never charged with a crime, privacy experts said. The law does not require that the government notify subscribers of third-party services that their records were put under the microscope.

John Murphy, director of the Ohio Prosecuting Attorneys Association, said evidence in a criminal case obtained through subpoenas can be challenged in court — a protection for those who believe their privacy has been violated.

“If the person (whose information) is being subpoenaed thinks the subpoena is overbroad and asks for things it shouldn’t be asking for, they can file a motion to quash, which goes before the court,” Murphy said.

But privacy advocacy groups said more protections are needed.

The proposed Electronic Communications Privacy Act Amendments Act of 2013, currently pending in Congress, would update the 1986 law by requiring the government to obtain a search warrant to get the contents of e-mails, texts, social media posts and other communications stored with third-party service providers. The legislation, which has bipartisan support, would also eliminate the 180-day rule on electronic messages, and require the government to notify people when it seizes their electronic communications.

Domestic spying and intelligence-gathering activities that do not require a warrant are rife with potential for abuse, said Brickner of the ACLU of Ohio.

“Once you can justify wrongly surveilling one group of people, it is very easy to do it with other groups that come along,” he said. “We need to change some of these laws and reverse this tide, otherwise we are just going to hear about these outrages and hear about the press being surveilled and political groups being wrongly targeted.”



Reader Comments ...


Next Up in News

VIDEO: Toddler reenacts 'The Fresh Prince Of Bel-Air' intro
VIDEO: Toddler reenacts 'The Fresh Prince Of Bel-Air' intro

Two-year-old Princeton Wright might not have been around when “The Fresh Prince of Bel-Air” was airing new episodes, but that didn’t stop the toddler from gleaning some inspiration from the show for his recent birthday party.  His mother, Hinesville, Georgia, photographer Neshaszda Wright of Neshaszda Z Photography, posted...
Zuckerberg visit a surprise to Dayton roundtable participants
Zuckerberg visit a surprise to Dayton roundtable participants

One of the most influential men in the world was in Dayton this weekend to talk to local people about opioid addiction, an issue devastating many area families. Facebook co-founder and CEO Mark Zuckerberg, who is touring the Midwest, stopped in Dayton on Saturday, for a community roundtable hosted by CareSource. Lori Erion, founding director of FOA...
Follow these detours around Dayton after I-75 shut down
Follow these detours around Dayton after I-75 shut down

Dayton-bound motorists on I-75 should use alternative routes to avoid a shut down in the downtown area from a fatal crash that resulted in a major fire.  Southbound motorists should exit onto I-70 East and proceed to I-675 South toward Cincinnati to get back onto I-75 in Miami Twp. Northbound motorists should take I-675 North to I-70 West and...
Billy Ray Cyrus changes name, releases new version of ‘Achy Breaky Heart’
Billy Ray Cyrus changes name, releases new version of ‘Achy Breaky Heart’

Country singer and songwriter Billy Ray Cyrus is celebrating the 25th anniversary of his hit “Achy Breaky Heart” with three new versions of the song. Rolling Stone reported that Cyrus has recorded “Achy Breaky Heart 25th,” a version closer to the original demo. It was released Friday. The song will also reportedly get a...
Facebook’s Mark Zuckerberg surprises Ohio family, drops in for dinner
Facebook’s Mark Zuckerberg surprises Ohio family, drops in for dinner

Guess who’s coming to dinner? Mark Zuckerberg! In their wildest dreams, an Ohio family couldn’t imagine hosting dinner for one of the wealthiest people in the world, and talking about politics and an African charity they support with the Facebook founder and CEO, but that’s exactly what happened. Members of the Moore family...
More Stories