<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          US EUROPE AFRICA ASIA 中文
          World / US and Canada

          Petraeus case shows FBI's authority to read email

          (Agencies) Updated: 2012-11-13 13:11

          Petraeus case shows FBI's authority to read email

          Commander of the International Security Assistance Force/US Forces in Afghanistan General David Petraeus shakes hands with author Paula Broadwell in this ISAF handout photo originally posted July 13, 2011. [Photo/Agencies]

          WASHINGTON - Your emails are not nearly as private as you think.

          The downfall of CIA Director David Petraeus demonstrates how easy it is for federal law enforcement agents to examine emails and computer records if they believe a crime was committed. With subpoenas and warrants, the FBI and other investigating agencies routinely gain access to electronic inboxes and information about email accounts offered by Google, Yahoo and other Internet providers.

          "The government can't just wander through your emails just because they'd like to know what you're thinking or doing," said Stewart Baker, a former assistant secretary at the Department of Homeland Security and now in private law practice. "But if the government is investigating a crime, it has a lot of authority to review people's emails."

          Under the 1986 Electronic Communications Privacy Act, federal authorities need only a subpoena approved by a federal prosecutor - not a judge - to obtain electronic messages that are six months old or older. To get more recent communications, a warrant from a judge is required. This is a higher standard that requires proof of probable cause that a crime is being committed.

          Public interest groups are pressing Congress for the law to be updated because it was written a quarter-century ago when most emails were deleted after a few months because the cost of storing them indefinitely was prohibitive. Now, "cloud computing" services provide huge amounts of inexpensive storage capacity. Other technological advances, such as mobile phones, have dramatically increased the amount of communications that are kept in electronic warehouses and can be reviewed by law enforcement authorities carrying a subpoena.

          "Technology has evolved in a way that makes the content of more communications available to law enforcement without judicial authorization, and at a very low level of suspicion," said Greg Nojeim, a senior counsel at the Center for Democracy & Technology.

          The chairman of the Senate Judiciary Committee, Patrick Leahy, has proposed changing the law to require a warrant for all Internet communications regardless of their age. But law enforcement officials have resisted because they said it would undercut their ability to catch criminals.

          A subpoena is usually sufficient to require Internet companies to reveal names and any other information that they have that would identify the owner of a particular email account. Google, which operates the widely used Gmail service, complied with more than 90 percent of the nearly 12,300 requests it received in 2011 from the US government for data about its users, according to figures from the company.

          Even if a Gmail account is created with a fictitious name, there are other ways to track down the user. Logs of when messages are sent reveal the Internet address the user used to log onto the account. Matching times and dates with locations allow investigators to piece together the chain.

          A Gmail account figured prominently in the FBI investigation that led to Petraeus' stunning resignation last week as the nation's spy chief. Petraeus, a retired Army general, stepped down after he confessed to an extramarital affair with Paula Broadwell, an Army Reserve officer and his biographer.

          The inquiry began earlier this year after Jill Kelley, a Florida woman who was friends with Petraeus and his wife, Holly, began receiving harassing emails. Kelley is a Tampa socialite. That is where the military's Central Command and Special Operations Command are located.

          Petraeus served as commander at Central Command from 2008 to 2010.

          FBI agents eventually determined that the email trail led to Broadwell, according to two federal law enforcement officials, who spoke on condition of anonymity because the sources were not authorized to speak about the matter on the record. As they looked further, the FBI agents came across a private Gmail account that used an alias name. On further investigation, the account turned out to be Petraeus's.

          The contents of several of the exchanges between Petraeus and Broadwell suggested they were having an affair, according to the officials. Investigators determined that no security breach had occurred, but continued their investigation into whether Petraeus had any role in the harassing emails that Broadwell had sent to Kelley, which was a criminal investigation.

          Petraeus and Broadwell apparently used a trick, known to terrorists and teen-agers alike, to conceal their email traffic.

          One of the law enforcement officials said they did not transmit all of their communications as emails from one's inbox to the other's inbox. Rather, they composed some emails in a Gmail account and instead of transmitting them, left them in a draft folder or in an electronic "dropbox". Then the other person could log onto the same account and read the draft emails there. This avoids creating an email trail which is easier to trace. It's a technique that al-Qaida terrorists began using several years ago and teen-agers in many countries have since adopted.

          Petraeus case shows FBI's authority to read email

          A combination photo shows Jill Kelley (L), a friend of former US General David Petraeus' family, in Tampa, Florida on Nov 12, 2012 and Petraeus' biographer Paula Broadwell, in an ISAF handout image, originally posted July 13, 2011. [Photo/Agencies]

          Trudeau visits Sina Weibo
          May gets little gasp as EU extends deadline for sufficient progress in Brexit talks
          Ethiopian FM urges strengthened Ethiopia-China ties
          Yemen's ex-president Saleh, relatives killed by Houthis
          Most Popular
          Hot Topics

          ...
          主站蜘蛛池模板: 国产成人精品区一区二区| 国产高清乱码又大又圆| 国产精品国产三级国产a| 黄床大片免费30分钟国产精品| 欧洲中文字幕国产精品| 欧洲熟妇色xxxxx| 久久热99这里只有精品| 国产综合久久久久久鬼色| 精品精品亚洲高清a毛片| 亚洲成人av综合一区| 亚洲国产成熟视频在线多多| 国产精品老熟女露脸视频| 日韩精品中文字幕有码| 高清中文字幕一区二区| 欧美老熟妇欲乱高清视频| 国产99视频精品免费专区| 最近中文字幕mv在线视频www| 亚洲国产成人精品女久久| 亚洲国产欧美另类va在线观看| 麻豆一区二区三区精品蜜桃| 国产91小视频在线观看| 久久人人爽爽人人爽人人片av| 8av国产精品爽爽ⅴa在线观看 | 狠狠综合久久av一区二| 熟妇人妻久久春色视频网| 日韩亚洲国产综合高清| 国精产品一区一区三区免费视频| 最近中文字幕完整版2019| 亚洲自拍精品视频在线| 亚洲av成人一区在线| 好男人视频在线播放| 亚洲AV无码一区二区三区在线播放| 日韩中文字幕不卡网站| 综合色综合色综合色综合| 大香网伊人久久综合网2020| 亚洲精品无amm毛片| av资源在线看免费观看| 综合欧美视频一区二区三区| 国产区精品福利在线观看精品| 国产av一区二区精品久久凹凸| 中文亚洲成A人片在线观看|