In light of the Petraeus investigation, this should be required reading for everyone:
https://www.fas.org/sgp/crs/misc/R41733.pdf
- Jason
With regards to the David Petraeusscandal, as you dig through the very human details of a powerful man's dalliance with an attractive woman, an important question should occur to anybody with more than aNational Enquirer-level interest in the matter: Wait ... The FBI did all of this digging over some bed-hopping? Yes. Yes, it did. And over at The Guardian, Glenn Greenwald wants to know why more people aren't concerned.As is now widely reported, the FBI investigation began when Jill Kelley - a Tampa socialite friendly with Petraeus (and apparently very friendly with Gen. John Allen, the four-star U.S. commander of the war in Afghanistan) - received a half-dozen or so anonymous emails that she found vaguely threatening. She then informed a friend of hers who was an FBI agent, and a major FBI investigation was then launched that set out to determine the identity of the anonymous emailer.That is the first disturbing fact: it appears that the FBI not only devoted substantial resources, but also engaged in highly invasive surveillance, for no reason other than to do a personal favor for a friend of one of its agents, to find out who was very mildly harassing her by email.
So not only did the FBI - again, all without any real evidence of a crime - trace the locations and identity of Broadwell and Petreaus, and read through Broadwell's emails (and possibly Petraeus'), but they also got their hands on and read through 20,000-30,000 pages of emails between Gen. Allen and Kelley.This is a surveillance state run amok. It also highlights how any remnants of internet anonymity have been all but obliterated by the union between the state and technology companies.
The downfall of CIA Director David Petraeus demonstrates how easy it is for federal law enforcement agents to examine emails and computer records if they believe a crime was committed. With subpoenas and warrants, the FBI and other investigating agencies routinely gain access to electronic inboxes and information about email accounts offered by Google, Yahoo and other Internet providers.
A technical glitch gave the F.B.I. access to the e-mail messages from an entire computer network — perhaps hundreds of accounts or more — instead of simply the lone e-mail address that was approved by a secret intelligence court as part of a national security investigation, according to an internal report of the 2006 episode.F.B.I. officials blamed an “apparent miscommunication” with the unnamed Internet provider, which mistakenly turned over all the e-mail from a small e-mail domain for which it served as host. The records were ultimately destroyed, officials said.
Can you tell us a little about your practice and your interest in predictive coding?“The Court has serious concerns with [plaintiff’s] retention policy and litigation hold process. Generally not deleting documents, and orally requesting certain employees to preserve relevant documents concurrently with filing a lawsuit, is completely inadequate.”