|
KF5JRV > TECH 06.07.16 13:36l 40 Lines 2192 Bytes #-3356 (0) @ WW
BID : 5641_KF5JRV
Read: DK3UZ GUEST OE7FMI
Subj: Mail Isolation Control and Tracking
Path: DB0FHN<OE2XZR<OE5XBL<F1OYP<IZ3LSV<IK6ZDE<I0OJJ<N6RME<N0KFQ<KF5JRV
Sent: 160706/1123Z 5641@KF5JRV.#NWAR.AR.USA.NA BPQK1.4.65
>From kf5jrv%kf5jrv.#nwar.ar.usa.na@i0ojj.ampr.org Wed Jul 6 13:30:13 2016
Received: from i0ojj.ampr.org by i0ojj.ampr.org (JNOS2.0k.rc) with SMTP
id AA234789 ; Wed, 06 Jul 2016 13:30:13 +0200
Message-Id: <5641_kf5jrv@n6rme.bbs>
>From: kf5jrv@kf5jrv.#nwar.ar.usa.na
X-JNOS-User-Port: Telnet (n6rme @ 44.134.32.240) -> Sending message
Mail Isolation Control and Tracking (MICT)
Since 2001 U.S. Postal Service computers have been photographing the exterior
of every piece of paper mail processed in the United States under the formerly
secret mass surveillance program known as Mail Isolation Control and Tracking
(MICT). Created in the aftermath of the 2001 anthrax attacks that
killed five people, including two postal workers, MICT enables the Postal
Service to track mail correspondence retroactively at the request of law
enforcement, under the "Mail cover" program.
"The Federal Bureau of Investigations revealed MICT on June 7, 2013 when
discussing the Bureau's investigation of ricin-laced letters sent to U.S.
President Barack Obama and New York City mayor Michael Bloomberg. The FBI
stated in a criminal complaint that the program was used to narrow its
investigation to Shannon Richardson.Computer security and information privacy
expert Bruce Schneier compared MICT to National Security Agency programs
leaked in June 2013 by Edward Snowden and said,
" 'Basically they are doing the same thing as the other programs, collecting
the information on the outside of your mail, the metadata, if you will, of
names, addresses, return addresses and postmark locations, which gives the
government a pretty good map of your contacts, even if they aren’t reading the
contents.'
"James J. Wedick, a former FBI agent, said of MICT, 'It’s a treasure trove of
information. Looking at just the outside of letters and other mail, I can see
who you bank with, who you communicate with — all kinds of useful information
that gives investigators leads that they can then follow up on with a
subpoena.' He also said the program 'can be easily abused because it’s so easy
to use and you don’t have to go through a judge to get the information. You
just fill out a form
Read previous mail | Read next mail
| |