OpenBCM V1.07b12 (Linux)

Packet Radio Mailbox

DB0FHN

[JN59NK Nuernberg]

 Login: GUEST





  
KF5JRV > TECH     06.07.16 13:36l 40 Lines 2192 Bytes #-3356 (0) @ WW
BID : 5641_KF5JRV
Read: DK3UZ GUEST OE7FMI
Subj: Mail Isolation Control and Tracking
Path: DB0FHN<OE2XZR<OE5XBL<F1OYP<IZ3LSV<IK6ZDE<I0OJJ<N6RME<N0KFQ<KF5JRV
Sent: 160706/1123Z 5641@KF5JRV.#NWAR.AR.USA.NA BPQK1.4.65

>From kf5jrv%kf5jrv.#nwar.ar.usa.na@i0ojj.ampr.org Wed Jul  6 13:30:13 2016
Received: from i0ojj.ampr.org by i0ojj.ampr.org (JNOS2.0k.rc) with SMTP
	id AA234789 ; Wed, 06 Jul 2016 13:30:13 +0200
Message-Id: <5641_kf5jrv@n6rme.bbs>
>From: kf5jrv@kf5jrv.#nwar.ar.usa.na
X-JNOS-User-Port: Telnet   (n6rme @ 44.134.32.240)  -> Sending message

Mail Isolation Control and Tracking (MICT)

Since 2001 U.S. Postal Service computers have been photographing the exterior 
of every piece of paper mail processed in the United States under the formerly 
secret mass surveillance program known as Mail Isolation Control and Tracking 
(MICT). Created in the aftermath of the 2001 anthrax attacks that 
killed five people, including two postal workers, MICT enables the Postal 
Service to track mail correspondence retroactively at the request of law 
enforcement, under the "Mail cover" program.

"The Federal Bureau of Investigations revealed MICT on June 7, 2013 when 
discussing the Bureau's investigation of ricin-laced letters sent to U.S. 
President Barack Obama and New York City mayor Michael Bloomberg. The FBI 
stated in a criminal complaint that the program was used to narrow its 
investigation to Shannon Richardson.Computer security and information privacy 
expert Bruce Schneier compared MICT to National Security Agency programs 
leaked in June 2013 by Edward Snowden and said,

" 'Basically they are doing the same thing as the other programs, collecting 
the information on the outside of your mail, the metadata, if you will, of 
names, addresses, return addresses and postmark locations, which gives the 
government a pretty good map of your contacts, even if they aren’t reading the 
contents.'

"James J. Wedick, a former FBI agent, said of MICT, 'It’s a treasure trove of 
information. Looking at just the outside of letters and other mail, I can see 
who you bank with, who you communicate with — all kinds of useful information 
that gives investigators leads that they can then follow up on with a 
subpoena.' He also said the program 'can be easily abused because it’s so easy 
to use and you don’t have to go through a judge to get the information. You 
just fill out a form



Read previous mail | Read next mail


 16.09.2025 09:44:47lGo back Go up