PRIVACY HOW TO PROTECT WHAT'S LEFT OF IT
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP90-01208R000100230037-8
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
8
Document Creation Date:
December 22, 2016
Document Release Date:
February 22, 2011
Sequence Number:
37
Case Number:
Publication Date:
January 1, 1979
Content Type:
OPEN SOURCE
File:
Attachment | Size |
---|---|
CIA-RDP90-01208R000100230037-8.pdf | 786.89 KB |
Body:
STA , Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Contents
Introduction ix
PART 1 Traditional Privacy Protections
1 Background 3
PART u Informational Privacy
2 Bank Records 15
3 Criminal Records 29
4 Consumer Credit Bureaus 43
5 Consumer Investigations 55
6 Employment Records 70
7 Federal Government Files 84
A WORD ABOUT THE CENSUS 99
A WORD ABOUT CANADA 102
8 Insurance Records 105
9 Mailing Lists 120
10 Medical Records 132
11 Privileges 145
12 School Records 152
13 Social Security Numbers 165
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Notes
Index
330
333
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Contents
14 State Government Files 175
A WORD ABOUT ADOPTION RECORDS
A WORD ABOUT JURORS 187
15 Tax Records 189
16 Telephone Privacy 198
184
PART III The New Technology and Your Rights
17 Computers 209
18 Electronic Surveillance 229
19 Fingerprinting 245
20 "Lie Detection" 250
21 Surveillance Devices 264
22 Voice Comparison 271
PART rv Physical Privacy
23 Sexual Privacy 275
24 In the Mails 291
25 In the Workplace 299
26 In the Community 304
A WORD ABOUT SEARCH AND SEIZURE 309
A WORD ABOUT DOOR-TO-DOOR SALES 312
A WORD ABOUT A WOMAN'S NAME 312
A WORD ABOUT THE PRESS 313
27 In the Home 315
A WORD ABOUT NOISE 319
PART v Psychological Aspects of Privacy
28 In Mind and Body 323
i
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
200 Informational Privacy
that it routinely discloses Southern California unlisted tele-
phone numbers to more than one hundred federal, state,
county, and city agencies, without ever informing subscribers.
The company said that it will confirm to a subscriber that the
number had been disclosed but will not volunteer the informa-
tion. Among the agencies that regularly received unlisted num-
bers on request are the Federal Bureau of Investigation, Cen-
tral Intelligence Agency, Border Patrol, Forest Service, Food
and Drug Administration, county probation offices, local police
and fire departments, Internal Revenue Service, county health
departments, county and city welfare departments, military
services, and volunteer "crisis" and suicide prevention centers.
Pacific Telephone provides about one hundred unlisted num-
bers a day to these agencies. New York Telephone Co. admit-
ted doing the same thing, even to a cop on the beat in a
nonemergency. Telephone companies in all parts of the coun-
try have much the same policies.
Another instance of generosity on the part of telephone com-
panies is their co-operation with government snoopers who ask
for a list of toll calls made from a particular telephone number.
Telephone companies provide these "telephone logs" freely to
the government without notifying the customer. The most no-
torious incident occurred in 1971, when the Chesapeake & Po-
tomac Telephone Co., in Washington, D.C., gave to the gov-
ernment a list of toll calls made by news columnist Jack
Anderson, the St. Louis Post-Dispatch, and Knight News-
papers. In 1974 the C. & P. Co. co-operated again, giving long-
distance records from the New York Times Washington bu-
reau for the preceding seven months to the Internal Revenue
Service. The IRS thus had a list of 2,400 calls made by Times
reporters, to see whether an IRS agent might have talked to a
Times staff member. The telephone company also turned over
a similar log on the home telephone of a Times reporter.
These logs are useful investigative tools. They don't reveal
the contents of a conversation, but they can help identify con-
tacts and associates of a caller and lead investigators to sources
of information.
Since 1974 the Bell Telephone System says it has been re-
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
230 The New Technology and Your Rights
ton, wiretaps with the consent of one of the parties to a conver-
sation are legal. Anybody may wire his or her own telephone
with a recording device and record his
phones or her own conversations
oniirethattheirtelephownone, without violating the law. The police may
w
, dial your number, and record the call. A
regular beep tone to alert you is no longer necessary.
The law clearly allows telephone companies to monitor any
telephone calls they wish, in order to check the working order
of equipment. The telephone employee rarely cares about the
content of the conversation or knows the identity of the callers.
The telephone companies also use this authority to detect peo-
ple who are defrauding telephone companies by using devices
that avoid toll charges.
The consent concept in the federal law has been extended to
authorize users of telephone equipment to monitor their own
lines, even though each individual employee has not provided
consent, or even knows about the eavesdropping. Federal law
says that this monitoring is legal, without a warrant or individ-
ual consent, to check on "the rendition of ... service." "Serv-
ice monitoring" is discussed in Chapter 16. Eavesdropping to
detect employee dishonesty has been regarded as legal under
this provision of the law. However, it is not valid for one
member of a household to consent to electronic eavesdropping
in behalf of the other members of the household.
The best-known category of wiretaps includes those installed
by law enforcement officers, with a warrant, approved by a
judge in advance under federal or state law 41 The warrant
must be specific as to the targets and the location of the surveil-
lance. The judge may order the wiretap if satisfied that there is
probable cause for belief that an individual is committing, has
committed, or is about to commit a particular crime-
espionage, sabotage, murder, kidnapping, extortion, bribery,
gambling, jury tampering, obstructing justice, theft from inter-
state shipments, counterfeiting, drug dealing, bankruptcy fraud,
illegal union activities, conspiracy, or other violent felonies.
There must also be probable cause to believe that electronic
surveillance will provide good evidence. The judge must certify
that other investigatory techniques have been tried unsuccess.
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
26o The New Technology and Your Rights
not. Drugstore clerks take polygraph tests; store managers do
not.
Even though the polygraph, which measures three bodily
changes, has not gained scientific acceptance, we have moved
into the second generation of "lie detection" with devices that
measure only one bodily change. The voice analyzer records
changes in the vibrations of the human voice, on the theory
that when a person is under stress these vibrations change. A
similar device, called the psychological stress evaluator, meas-
ures changes in the inaudible frequency modulation of the
human voice. These devices have been with us only since 1970,
but business managers desperate for a short cut to truth have
shown interest in them because they can be used without the
knowledge of the subject. The machine fits into a briefcase. No
obtrusive rubber hose around the stomach, no cuff around the
arm here-a hidden microphone will do. Some users claim that
the machines work on telephone or tape-recorded voices. They
have even used the technique on the voices of persons long
since dead to tell us who really killed President Kennedy.
Clearly these devices are less reliable than even the polygraph
because they measure only one bodily change. A study for the
U. S. Army Land Warfare Laboratory in 1974 reported that
the machines were not nearly as reliable as not only the poly-
graph but also the tried-and-true method of simply observing a
subject's behavior. Accuracy rates in this test of voice analysis
for the Army, the most recent pertinent research, ranged from
19 to 33 per cent. The technique is less successful, in fact, than
mere chance. The Department of Defense and the Central In-
telligence Agency, whose pursuit of new investigative toys is
well known, have both found voice analyzers and psychological
stress evaluators wanting. Neither agency relies on them.
They are thought to be rarely used. Throughout the federal
government there were fewer than a dozen machines in 1974,
and the companies that make them are far from candidates for
Fortune's Top co 5(or 5,00o) companies. But because they can
be used behind the back of an individual-or long after the
subject has uttered words-who can say where or when they are
used? An entrepreneur in the northwest United States has re-
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
In the Mails 293
Consulate of Chile in San Diego. Assorted others read mail out
of idle curiosity.
The latest word from the Department of Justice is that read-
ing mail requires a warrant. (The U.S. attorney in the southern
district of New York claimed that the restriction applied only
to sealed mail and that the Customs had already unsealed the
mail and therefore the restriction wasn't applicable.)
A Customs Bureau official told Congress in 2977 that other
federal investigating agencies laughed at Customs when told
they couldn't read mail that was opened. From 1953 to 1973, in
violation of federal statutes and the Constitution, the Central
Intelligence Agency conducted an extensive program of open-
ing and reading first-class mail passing in and out of the coun-
try through Hawaii, San Francisco, New Orleans, and New
York City. The Federal Bureau of Investigation got to take a
look as well. Mail to and from the Soviet Union was automat-
ically suspect.
Under this institutionalized nosiness (code-named HTLIN-
GUAL and SRPOINTER), the CIA copied at least 225,000
letters and distributed them to other federal agencies for lei-
sure-time reading. The CIA took down the names of every per-
son mentioned in the correspondence-2.5 million persons in
all-and stored them in its computer data bank in McLean,
Virginia. Among those whose mail was read and photocopied
were John Steinbeck, author of The Grapes of Wrath; Jane
Fonda, film actress and political dissident in the early 1970s;
Senator Frank Church of Idaho, whose mother wrote to him
from Moscow; a sociology professor at Amherst College who
notified two colleagues at Moscow State University about an
academic conference; an American exchange student in Mos-
cow writing back home to his father; and an American woman
who wrote to a Soviet dissident whom she had met on a trip to
Russia. Can the United States adequately crusade for the free-
dom of dissidents in the Soviet Union if American agents
themselves are reading the mail of the Soviet citizens?
The CIA claims to be able to read mail without even open-
ing the envelope. It uses a chemical to decipher the writing in-
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
Sanitized Copy Approved for Release 2011/02/22 : CIA-RDP90-01208R000100230037-8
294 Physical Privacy
side, according to secret testimony in 1975 by William E.
Colby, then director of the CIA. But as long as postal authori-
ties allowed the CIA to read mail in the States, there was no
need to use the special potion in the United States.
The CIA's routine reading of mail within the United States
was said to have stopped in 1973, and the Postal Service said in
1975 that it no longer permits CIA agents to get a look at the
mail. The FBI somehow does get hold of mail, most of it from
overseas, and reads it. Until 1977 it even had a special office
behind the Capitol in Washington, D.C., for translating when
necessary. Most of this mail is personal correspondence be-
tween American families and friends in Russia or China.
The extent to which federal agents open and read domestic
mail is not known. About two hundred times a year, court or-
ders allow federal authorities to do so. Federal agents are not
supposed to do so without warrants.
The FBI makes use of the Postal Service's change-of-address
records. FBI documents about a friend of mine showed that
the Denver Field Office reported to headquarters the new ad-
dress to which my friend had asked the Post Office to forward
his mail. (The FBI also received the co-operation of a Denver
moving company to find out where my friend was shipping his
furniture.)
In addition to opening and reading mail, federal agents also
use "mail covers," the interception of mail to a particular ad-
dress to copy down all information on the outside of the enve-
lope. About three hundred postal inspectors conduct the moni-
toring. Return addresses and the date of the postmark are
copied and forwarded to the agency that requested the cover.
Sometimes a fugitive will disclose his or her whereabouts by
placing a return address on correspondence to the family. A
mail cover on a company suspected of mail fraud may turn up
the addresses of victims who could provide evidence for prose-
cution. The Postal Service takes the position that such surveil-
lance does not violate the Fourth Amendment and requires no
warrant, because the mail is not opened. The service will moni-
tor mail only for law enforcement agencies and only to protect