http://www.wired.com/threatlevel/2012/11/gmail-location-data-petraeus/ This indicates - to some degree - how the FBI was able to link a variety of e-mail accounts to one person. On 14/11/12 15:20, gtmarx wrote: > *Colleagues --the recent U.S. case raises many issues for those of our > scholarly perusaion. The exploding linkage quality of this might (ala 6 > degrees of freedom) end up in an expanding geometric net involving almost > all users. This represents such a radical break with the plodding, labor > intensive, disaggregated, chance nature of so many investigations before > computers in which privacy (for both good and ill was protected as much > by inefficiency as by principles). However, in this case at least there > was a warrant and some modest grounds to pursue something. There is an > inherent and uneasy dilemma in any investigation re when to wait for some > reasonable suspicion and when to act. Guidelines are essential, as is the > discretion of wise supervisors. * > > ** > > *The case also involves the challenges of whistle blowing ala the agent > who did an end run around the chain of command to report his concerns > that there was politically inspired foot dragging by his colleagues. > Another provocative (so to speak) thought is whether, as with the CIA’s > policy of accepting homosexual employees who openly acknowledge their > preference, is to apply the same standard to marital indiscretion That > would avoid the issue of blackmail, but might not help the sanctity of > traditional marriage which is much in the news these days.* > > ** > > ** > > http://www.nytimes.com/2012/11/14/us/david-petraeus-case-raises-concerns-about-americans-privacy.html?hp > > > > Petraeus Case Raises Fears About Privacy in Digital Era > > > By SCOTT SHANE > <http://topics.nytimes.com/top/reference/timestopics/people/s/scott_shane/index.html> > > The F.B.I. > <http://topics.nytimes.com/top/reference/timestopics/organizations/f/federal_bureau_of_investigation/index.html?inline=nyt-org> > investigation that toppled the director of the C.I.A. > <http://topics.nytimes.com/top/reference/timestopics/organizations/c/central_intelligence_agency/index.html?inline=nyt-org> > and now threatens to tarnish > <http://www.nytimes.com/2012/11/14/us/top-us-commander-in-afghanistan-is-linked-to-petraeus-scandal.html?hp> > the reputation of the top American commander in Afghanistan > underscores a danger that civil libertarians have long warned about: > that in policing the Web for crime, espionage and sabotage, > government investigators will unavoidably invade the private lives of > Americans. > > On the Internet, and especially in e-mail, text messages, social > network postings and online photos, the work lives and personal lives > of Americans are inextricably mixed. Private, sensitive messages are > stored for years on computer servers, available to be discovered by > investigators who may be looking into completely unrelated matters. > > In the current F.B.I. case, a Tampa woman, Jill Kelley, a friend both > of David H. Petraeus > <http://topics.nytimes.com/top/reference/timestopics/people/p/david_h_petraeus/index.html?inline=nyt-per>, > the former C.I.A. director, and Gen. John R. Allen, the top NATO > commander in Afghanistan, was disturbed by a half-dozen anonymous > e-mails she had received in June. She took them to an F.B.I. agent > whose acquaintance with Ms. Kelley (he had sent her shirtless photos > of himself — electronically, of course) eventually prompted his > bosses to order him to stay away from the investigation. > > But a squad of investigators at the bureau’s Tampa office, in > consultation with prosecutors, opened a cyberstalking inquiry. > Although that investigation is still open, law enforcement officials > have said that criminal charges appear unlikely. > > In the meantime, however, there has been an earthquake of unintended > consequences. What began as a private, and far from momentous, > conflict between two women, Ms. Kelley and Paula Broadwell, Mr. > Petraeus’s biographer and the reported author of the harassing > e-mails, has had incalculable public costs. > > The C.I.A. is suddenly without a permanent director at a time of > urgent intelligence challenges in Syria, Iran, Libya and beyond. The > leader of the American-led effort to prevent a Taliban takeover in > Afghanistan is distracted, at the least, by an inquiry into his > e-mail exchanges with Ms. Kelley by the Defense Department’s > inspector general. > > For privacy advocates, the case sets off alarms. > > “There should be an investigation not of the personal behavior of > General Petraeus and General Allen but of what surveillance powers > the F.B.I. used to look into their private lives,” Anthony D. Romero, > executive director of the American Civil Liberties Union, said in an > interview. “This is a textbook example of the blurring of lines > between the private and the public.” > > Law enforcement officials have said they used only ordinary methods > in the case, which might have included grand jury subpoenas and > search warrants. As the complainant, Ms. Kelley presumably granted > F.B.I. specialists access to her computer, which they would have > needed in their hunt for clues to the identity of the sender of the > anonymous e-mails. While they were looking, they discovered General > Allen’s e-mails, which F.B.I. superiors found “potentially > inappropriate” and decided should be shared with the Defense Department. > > In a parallel process, the investigators gained access, probably > using a search warrant, to Ms. Broadwell’s Gmail account. There they > found messages that turned out to be from Mr. Petraeus. > > Marc Rotenberg, executive director of the Electronic Privacy > Information Center in Washington, said the chain of unexpected > disclosures is not unusual in computer-centric cases. > > “It’s a particular problem with cyberinvestigations — they rapidly > become open-ended, because there’s such a huge quantity of > information available and it’s so easily searchable,” he said, > adding, “If the C.I.A. director can get caught, it’s pretty much open > season on everyone else.” > > For years now, as national security officials and experts have warned > of a Pearl Harbor cyberattack that could fray the electrical grid or > collapse stock markets, policy makers have jostled over which > agencies should be assigned the sensitive task of monitoring the > Internet for dangerous intrusions. > > Advocates for civil liberties have been especially wary of the > National Security Agency, whose expertise is unrivaled but whose > immense surveillance capabilities they see as frightening. They have > successfully urged that the Department of Homeland Security take the > leading role in cybersecurity. > > That is in part because the D.H.S., if far from entirely open to > public scrutiny, is much less secretive than the N.S.A., the > eavesdropping and code-breaking agency. To this day, N.S.A. officials > have revealed almost nothing about the warrantless wiretapping it > conducted inside the United States in the hunt for terrorists in the > years after 2001, even after the secret program was disclosed > <http://www.nytimes.com/2005/12/16/politics/16program.html?pagewanted=all> > by The New York Times in 2005 and set off a political firestorm. > > The hazards of the Web as record-keeper, of course, are a familiar > topic. New college graduates find that their Facebook postings give > would-be employers pause. Husbands discover wives’ infidelity by > spotting incriminating e-mails on a shared computer. Teachers lose > their jobs over impulsive Twitter comments. > > But the events of the last few days have shown how law enforcement > investigators who plunge into the private territories of cyberspace > looking for one thing can find something else altogether, with > astonishingly destructive results. > > Some people may applaud those results, at least in part. By having a > secret extramarital affair, for instance, Mr. Petraeus was arguably > making himself vulnerable to blackmail, which would be a serious > concern for a top intelligence officer. What if Russian or Chinese > intelligence, rather than the F.B.I., had discovered the e-mails > between the C.I.A. director and Ms. Broadwell? > > Likewise, military law prohibits adultery — which General Allen’s > associates say he denies committing — and some kinds of > relationships. So should an officer’s privacy really be total? > > But some commentators have renewed an argument that a puritanical > American culture overreacts to sexual transgressions that have little > relevance to job performance. “Most Americans were dismayed that > General Petraeus resigned,” said Mr. Romero of the A.C.L.U. > > That old debate now takes place in a new age of electronic > information. The public shaming that labeled the adulterer in > Nathaniel Hawthorne’s “Scarlet Letter” might now be accomplished by > an F.B.I. search warrant or an N.S.A. satellite dish. > > --------------------------------------------------------------------------- > _______________________________________________ > EPIC_Advisors mailing list > [log in to unmask] > http://mailinglists.epic.org/mailman/listinfo/epic_advisors > > **************************************************** This is a message > from the SURVEILLANCE listserv for research and teaching in surveillance > studies. To unsubscribe, please send the following message to : > UNSUBSCRIBE SURVEILLANCE For further help, please visit: > http://www.jiscmail.ac.uk/help > **************************************************** **************************************************** This is a message from the SURVEILLANCE listserv for research and teaching in surveillance studies. To unsubscribe, please send the following message to <[log in to unmask]>: UNSUBSCRIBE SURVEILLANCE For further help, please visit: http://www.jiscmail.ac.uk/help ****************************************************