05:08 PM

DEA, NSA Teamwork: 6 Privacy Worries

Government agents investigating criminal cases reportedly are tapping into NSA-furnished intelligence. Legal experts cry foul.

3. Scope Creep: Welcome To The Surveillance State.

Privacy and civil rights groups have responded to the revelations over the DEA's SOD unit by asking what protections are in place to review whether that information sharing is appropriate or legal.

"Last month, I wrote about the potential for mass surveillance mission creep: the tendency for the vast NSA surveillance apparatus to be used for other, lesser, crimes," said Schneier, who joined the board of directors of privacy rights group Electronic Frontier Foundation in the wake of details about Prism and other NSA surveillance programs being made public. "My essay was theoretical, but it turns out to be already happening."

4. Lack Of Surveillance Oversight: Secrets Within Secrets.

Of course, intelligence programs are often justified as being a necessary evil, and their workings guarded from public scrutiny, lest the information help foreign intelligence agents avoid counterespionage efforts. But what happens when the fruits of a country's intelligence programs are directed at its own citizenry, and government agents then lie about how they obtained the information?

"I have never heard of anything like this at all," Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011, told Reuters. "It is one thing to create special rules for national security," she said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."

5. DEA Agents Told To Stay Quiet.

"Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," said a DEA document obtained by Reuters. Accordingly, the document instructed agents to pursue "parallel construction," which involves working backward to justify the need for an investigation using other means. Or, in the parlance of the DEA document, agents are advised to use "normal investigative techniques to recreate the information provided by SOD."

According to numerous legal experts, using parallel construction might be legal for demonstrating probable cause; for example, to obtain a warrant. But not disclosing where the evidence was originally obtained might violate pretrial rules designed to ensure that defendants are granted access to all evidence that might be used against them in court -- and which might help them prove their innocence.

"The DEA is violating our fundamental right to a fair trial," said Ezekiel Edwards, director of the ACLU's criminal law reform project, in a statement. "When someone is accused of a crime, the Constitution guarantees the right to examine the government's evidence, including its sources, and confront the witnesses against them. Our due process rights are at risk when our federal government hides and distorts the sources of evidence used as the basis for arrests and prosecutions."

6. NSA Programs Still On Shaky Legal Grounds.

The DEA's use and distribution of evidence gleaned from intelligence dragnets -- and then disguising its origins -- has legal experts further up in arms precisely because the legality of the dragnets themselves remains an open question. Although White House officials have said that the programs fully comply with the Patriot Act, as well as the Foreign Intelligence Surveillance Act (FISA), which is overseen by the Foreign Intelligence Surveillance Court (FISC), legislators aren't so sure.

"I am extremely disturbed by what appears to be an overbroad interpretation of the Act," said Rep. James Sensenbrenner (R-Wis.), the author of the Patriot Act, in a letter he sent to Attorney General Eric Holder in June. Holder, of course, leads the Department of Justice, which is now investigating the DEA's use of that intelligence. According to documents leaked by Snowden, Holder also signed a secret 2009 memorandum laying out the minimization procedures that NSA analysts needed to use to help them avoid spying on American citizens.

2 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cara Latham
Cara Latham,
User Rank: Apprentice
8/8/2013 | 5:30:28 PM
re: DEA, NSA Teamwork: 6 Privacy Worries
If the DEA is reverse-engineering the evidence trail for its own causes, then what is to stop other governmental and law enforcement agencies from tapping NSA data to do the same? These legal/privacy issues really need to be addressed.
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio