"Only dull people are brilliant at breakfast"
-Oscar Wilde
Brilliant at Breakfast title banner "The liberal soul shall be made fat, and he that watereth, shall be watered also himself."
-- Proverbs 11:25
"...you have a choice: be a fighting liberal or sit quietly. I know what I am, what are you?" -- Steve Gilliard, 1964 - 2007

"For straight up monster-stomping goodness, nothing makes smoke shoot out my ears like Brilliant@Breakfast" -- Tata

"...the best bleacher bum since Pete Axthelm" -- Randy K.

"I came here to chew bubblegum and kick ass. And I'm all out of bubblegum." -- "Rowdy" Roddy Piper (1954-2015), They Live
Saturday, February 16, 2008

"Technical glitch" my ass
Posted by Jill | 10:29 PM
What kind of schmucks do they take us for?

A technical glitch gave the F.B.I. access to the e-mail messages from an entire computer network — perhaps hundreds of accounts or more — instead of simply the lone e-mail address that was approved by a secret intelligence court as part of a national security investigation, according to an internal report of the 2006 episode.

F.B.I. officials blamed an “apparent miscommunication” with the unnamed Internet provider, which mistakenly turned over all the e-mail from a small e-mail domain for which it served as host. The records were ultimately destroyed, officials said.

Bureau officials noticed a “surge” in the e-mail activity they were monitoring and realized that the provider had mistakenly set its filtering equipment to trap far more data than a judge had actually authorized.

The episode is an unusual example of what has become a regular if little-noticed occurrence, as American officials have expanded their technological tools: government officials, or the private companies they rely on for surveillance operations, sometimes foul up their instructions about what they can and cannot collect.

The problem has received no discussion as part of the fierce debate in Congress about whether to expand the government’s wiretapping authorities and give legal immunity to private telecommunications companies that have helped in those operations.

But an intelligence official, who spoke on condition of anonymity because surveillance operations are classified, said: “It’s inevitable that these things will happen. It’s not weekly, but it’s common.”

A report in 2006 by the Justice Department inspector general found more than 100 violations of federal wiretap law in the two prior years by the Federal Bureau of Investigation, many of them considered technical and inadvertent.

Bureau officials said they did not have updated public figures but were preparing them as part of a wider-ranging review by the inspector general into misuses of the bureau’s authority to use so-called national security letters in gathering phone records and financial documents in intelligence investigations.

In the warrantless wiretapping program approved by President Bush after the Sept. 11 terrorist attacks, technical errors led officials at the National Security Agency on some occasions to monitor communications entirely within the United States — in apparent violation of the program’s protocols — because communications problems made it difficult to tell initially whether the targets were in the country or not.

Past violations by the government have also included continuing a wiretap for days or weeks beyond what was authorized by a court, or seeking records beyond what were authorized. The 2006 case appears to be a particularly egregious example of what intelligence officials refer to as “overproduction” — in which a telecommunications provider gives the government more data than it was ordered to provide.

The problem of overproduction is particularly common, F.B.I. officials said. In testimony before Congress in March 2007 regarding abuses of national security letters, Valerie E. Caproni, the bureau’s general counsel, said that in one small sample, 10 out of 20 violations were a result of “third-party error,” in which a private company “provided the F.B.I. information we did not seek.”


First class schmucks, apparently.

Doesn't this sound a little bit like, oh, say, something like Roger Clemens telling Brian McNamee not to tell him what he was injecting? Didn't they used to call this "plausible deniability"?

In the cyber era, the incident is the equivalent of law enforcement officials getting a subpoena to search a single apartment, but instead having the landlord give them the keys to every apartment in the building.


Or more accurately, it's sort of like law enforcement officials getting a subpoena to search a single apartment but instead busting down the doors of every apartment in the building and then shooting indiscriminately. Sort of like this, this, this, and these.

Labels: , ,

Bookmark and Share