SlideShare a Scribd company logo
1 of 22
The State of Surveillance
Christopher Soghoian
Center for Cybersecurity Research
Indiana University
The state of surveillance
(law enforcement)
Wiretaps in the US
• Real-time interception of communications
content.
• Includes
– Voice communications
– Text messages / IM
– Network traffic (think: tcpdump)
• To get one, law enforcement must get a
“super warrant”: probable cause +
The use of real-time, content
intercepts (“wiretaps”) in the US
continues to grow each year
0
500
1000
1500
2000
2500 '87
'88
'89
'90
'91
'92
'93
'94
'95
'96
'97
'98
'99
'00
'01
'02
'03
'04
'05
'06
'07
'08
'09
Intercept orders granted between 1987 and 2009
Total intercepts authorized Federal intercepts authorized
Drugs are bad
(If you value your privacy)
0
500
1000
1500
2000
2500
'99 '00 '01 '02 '03 '04 '05 '06 '07 '08 '09
Major offense specified in intercept order:
Narcotics vs all other crimes
Narcotics All other crimes
If you are going to break the law, and
don’t want to be wiretapped, stick
with something safer…
Like murder, bribery, or extortion
Major offense specified in intercept
orders (2009)
Arson, explosives, and weapons 18
Bribery 2
Extortion (includes usury and loan-sharking) 3
Gambling 35
Homicide and assault 82
Larceny and theft 35
Narcotics 2,046
Robbery and burglary 9
Racketeering 61
Other or unspecified 85
Total 2376
Phone surveillance increases each
year, while other forms all decline
(due to more intercepts by states,
not the federal government)
0
500
1000
1500
2000
2500
'97 '98 '99 '00 '01 '02 '03 '04 '05 '06 '07 '08 '09
Types of intercept orders
(1997 - 2009)
Total Phone Intercept Orders Federal Phone Intercept Orders
Total Electronic Intercept Orders Federal Electronic Intercept Orders
Total Combined Intercept Orders Federal Combined Intercept Orders
In 2009, 95% of all intercept orders
were for a portable device
0
500
1000
1500
2000
2500
'00 '01 '02 '03 '04 '05 '06 '07 '08 '09
Location of authorized intercept orders
(2000 - 2009)
Personal residence Business Portable device
Electronic intercept orders used to be
significant in number…..
0
100
200
300
400
500
600
700
800
'97 '98 '99 '00 '01 '02 '03 '04 '05 '06 '07 '08 '09
Electronic and Combined Intercept Orders
(1997 - 2009)
Total Electronic Intercept Orders Federal Electronic Intercept Orders
Total Combined Intercept Orders Federal Combined Intercept Orders
But have plunged over the past few
years….
To less than 5 per year.
0
5
10
15
20
25
30
35
40
'04 '05 '06 '07 '08 '09
Electronic Intercept Orders
(2004 - 2009)
Total Electronic Intercept Orders Federal Electronic Intercept Orders
What happened?
Network Wiretaps?
• Law enforcement agencies are simply not
performing real-time data network intercepts of
communications content.
• These stats do not cover FISA / intel agencies,
who almost certainly are.
• Law enforcement are instead relying on access
to stored communications (cheaper, easier, etc).
• Why tap your ISP in real-time when your email
provider will readily give up the files later?

More Related Content

What's hot

Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Winthrop Yu
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesEvents2018
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationInternet Law Center
 
Attorney Ray Richards Criminal law Breakdown Presenttaion
Attorney Ray Richards Criminal law Breakdown PresenttaionAttorney Ray Richards Criminal law Breakdown Presenttaion
Attorney Ray Richards Criminal law Breakdown PresenttaionAttorney Ray Richards
 
Online Advertising Legal Update 2014
Online Advertising Legal Update 2014Online Advertising Legal Update 2014
Online Advertising Legal Update 2014Internet Law Center
 
Five Rules of Reputation Management
Five Rules of Reputation ManagementFive Rules of Reputation Management
Five Rules of Reputation ManagementInternet Law Center
 
Internet Filtering In South Korea
Internet Filtering In South KoreaInternet Filtering In South Korea
Internet Filtering In South Koreamichroeder
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Christina Gagnier
 
New laws impacting the judiciary
New laws impacting the judiciaryNew laws impacting the judiciary
New laws impacting the judiciaryKatieDavis103
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreInternet Law Center
 

What's hot (17)

Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
 
Attorney Ray Richards Criminal law Breakdown Presenttaion
Attorney Ray Richards Criminal law Breakdown PresenttaionAttorney Ray Richards Criminal law Breakdown Presenttaion
Attorney Ray Richards Criminal law Breakdown Presenttaion
 
Blogging & Law
Blogging & LawBlogging & Law
Blogging & Law
 
File000159
File000159File000159
File000159
 
Online Advertising Legal Update 2014
Online Advertising Legal Update 2014Online Advertising Legal Update 2014
Online Advertising Legal Update 2014
 
Can Spam At 5
Can Spam At 5Can Spam At 5
Can Spam At 5
 
Five Rules of Reputation Management
Five Rules of Reputation ManagementFive Rules of Reputation Management
Five Rules of Reputation Management
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Internet Filtering In South Korea
Internet Filtering In South KoreaInternet Filtering In South Korea
Internet Filtering In South Korea
 
Tia
TiaTia
Tia
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
New laws impacting the judiciary
New laws impacting the judiciaryNew laws impacting the judiciary
New laws impacting the judiciary
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
 

Similar to The State of Surveillance: Wiretaps Grow for Phones but Decline for Networks

Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In ComputingCTIN
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Role of law enforcement, si as & others
Role of law enforcement, si as & othersRole of law enforcement, si as & others
Role of law enforcement, si as & othersrcorrigan
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Frameworkanthonywong
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)Fabio Pietrosanti
 
Privacy And Surveillance
Privacy And SurveillancePrivacy And Surveillance
Privacy And SurveillanceSarah Cortes
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptOlusegun Mosugu
 
Cyber Crimes Forensics
Cyber Crimes ForensicsCyber Crimes Forensics
Cyber Crimes Forensicssayansambit
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the governmentguest70f067f
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the governmentguest70f067f
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 

Similar to The State of Surveillance: Wiretaps Grow for Phones but Decline for Networks (20)

Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
External Systems
External SystemsExternal Systems
External Systems
 
Role of law enforcement, si as & others
Role of law enforcement, si as & othersRole of law enforcement, si as & others
Role of law enforcement, si as & others
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
History of computer crime
History of computer crimeHistory of computer crime
History of computer crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
Privacy And Surveillance
Privacy And SurveillancePrivacy And Surveillance
Privacy And Surveillance
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
 
Cyber Crimes Forensics
Cyber Crimes ForensicsCyber Crimes Forensics
Cyber Crimes Forensics
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
 
ppt cyber law 1.pptx
ppt cyber law 1.pptxppt cyber law 1.pptx
ppt cyber law 1.pptx
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 

Recently uploaded

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 

The State of Surveillance: Wiretaps Grow for Phones but Decline for Networks

  • 1. The State of Surveillance Christopher Soghoian Center for Cybersecurity Research Indiana University
  • 2. The state of surveillance (law enforcement)
  • 3. Wiretaps in the US • Real-time interception of communications content. • Includes – Voice communications – Text messages / IM – Network traffic (think: tcpdump) • To get one, law enforcement must get a “super warrant”: probable cause +
  • 4. The use of real-time, content intercepts (“wiretaps”) in the US continues to grow each year
  • 5. 0 500 1000 1500 2000 2500 '87 '88 '89 '90 '91 '92 '93 '94 '95 '96 '97 '98 '99 '00 '01 '02 '03 '04 '05 '06 '07 '08 '09 Intercept orders granted between 1987 and 2009 Total intercepts authorized Federal intercepts authorized
  • 6. Drugs are bad (If you value your privacy)
  • 7. 0 500 1000 1500 2000 2500 '99 '00 '01 '02 '03 '04 '05 '06 '07 '08 '09 Major offense specified in intercept order: Narcotics vs all other crimes Narcotics All other crimes
  • 8. If you are going to break the law, and don’t want to be wiretapped, stick with something safer…
  • 9. Like murder, bribery, or extortion
  • 10. Major offense specified in intercept orders (2009) Arson, explosives, and weapons 18 Bribery 2 Extortion (includes usury and loan-sharking) 3 Gambling 35 Homicide and assault 82 Larceny and theft 35 Narcotics 2,046 Robbery and burglary 9 Racketeering 61 Other or unspecified 85 Total 2376
  • 11. Phone surveillance increases each year, while other forms all decline (due to more intercepts by states, not the federal government)
  • 12. 0 500 1000 1500 2000 2500 '97 '98 '99 '00 '01 '02 '03 '04 '05 '06 '07 '08 '09 Types of intercept orders (1997 - 2009) Total Phone Intercept Orders Federal Phone Intercept Orders Total Electronic Intercept Orders Federal Electronic Intercept Orders Total Combined Intercept Orders Federal Combined Intercept Orders
  • 13. In 2009, 95% of all intercept orders were for a portable device
  • 14. 0 500 1000 1500 2000 2500 '00 '01 '02 '03 '04 '05 '06 '07 '08 '09 Location of authorized intercept orders (2000 - 2009) Personal residence Business Portable device
  • 15. Electronic intercept orders used to be significant in number…..
  • 16. 0 100 200 300 400 500 600 700 800 '97 '98 '99 '00 '01 '02 '03 '04 '05 '06 '07 '08 '09 Electronic and Combined Intercept Orders (1997 - 2009) Total Electronic Intercept Orders Federal Electronic Intercept Orders Total Combined Intercept Orders Federal Combined Intercept Orders
  • 17. But have plunged over the past few years….
  • 18. To less than 5 per year.
  • 19. 0 5 10 15 20 25 30 35 40 '04 '05 '06 '07 '08 '09 Electronic Intercept Orders (2004 - 2009) Total Electronic Intercept Orders Federal Electronic Intercept Orders
  • 21.
  • 22. Network Wiretaps? • Law enforcement agencies are simply not performing real-time data network intercepts of communications content. • These stats do not cover FISA / intel agencies, who almost certainly are. • Law enforcement are instead relying on access to stored communications (cheaper, easier, etc). • Why tap your ISP in real-time when your email provider will readily give up the files later?