{"id":1452,"date":"2008-01-31T09:20:52","date_gmt":"2008-01-31T09:20:52","guid":{"rendered":"https:\/\/discovery.org\/tech\/2008\/01\/31\/dial_08_for_terrorism\/"},"modified":"2024-10-15T21:57:08","modified_gmt":"2024-10-15T21:57:08","slug":"dial_08_for_terrorism","status":"publish","type":"post","link":"https:\/\/www.discovery.org\/tech\/2008\/01\/31\/dial_08_for_terrorism\/","title":{"rendered":"Dial &#8217;08 for terrorism"},"content":{"rendered":"<p>John Wohlstetter references the practical difficulty of making telephone companies responsible for the legality of government requests for surveillance of terrorist communications in a <a href=\"http:\/\/washingtontimes.com\/article\/20080131\/COMMENTARY\/318304529\/1012\">column<\/a> for the <i>Washington Times<\/i>: <\/p>\n<blockquote><p>Standard telephone company practice, going back decades in criminal investigations, holds that on being served with a request from the government, it is visually scanned by company officials for facial validity, to determine if it looks like a proper legal document. Absent an obvious facial defect, the document is presumed genuine and lawful. Given the volume of such requests &#8212; many thousands per year &#8212; imposing any burden on companies beyond a facial scan to ascertain probable authenticity would lead them to decline such requests, thus forcing the government to go to court every time. The expense of even a victorious legal defense, let lone the risk of unsympathetic jurors returning million-dollar verdicts, would cause companies to strenuously resist cooperating.<\/p><\/blockquote>\n<p> Senate Judiciary Chairman Patrick Leahy (D-VT) <a href=\"http:\/\/www.fas.org\/irp\/congress\/2007_cr\/leahy121807.html\">claims<\/a> that &#8220;telecommunications carriers will still have immunity for actions they take in the future. If they follow the law, they have immunity.&#8221;  But he opposes retroactive immunity, believing that lawsuits against telephone companies are the only way the Bush administration will be &#8220;called to account.&#8221;  That may be good politics, but it&#8217;s bad policy.<br \/>\nIdentifying terrorists is a cat-and-mouse game, and by withholding retroactive immunity Leahy and others will frighten communications companies from cooperating  with investigators the next time they try to employ novel or unexpected investigative techniques.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>John Wohlstetter references the practical difficulty of making telephone companies responsible for the legality of government requests for surveillance of terrorist communications in a column for the Washington Times: Standard telephone company practice, going back decades in criminal investigations, holds that on being served with a request from the government, it is visually scanned by company officials for facial validity, to determine if it looks like a proper legal document. Absent an obvious facial defect, the document is presumed genuine and lawful. Given the volume of such requests &#8212; many thousands per year &#8212; imposing any burden on companies beyond a facial scan to ascertain probable authenticity would lead them to decline such requests, thus forcing the government to go<a class=\"ellipsis article-more\" href=\"https:\/\/www.discovery.org\/tech\/2008\/01\/31\/dial_08_for_terrorism\/\"><span> Read More &rsaquo;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[70],"tags":[],"coauthors":[112],"class_list":["post-1452","post","type-post","status-publish","format-standard","hentry","category-censorship-and-surveillance"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/posts\/1452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/comments?post=1452"}],"version-history":[{"count":0,"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/posts\/1452\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/media?parent=1452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/categories?post=1452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/tags?post=1452"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/coauthors?post=1452"}],"wp:action-assign-author":[{"href":"https:\/\/www.discovery.org\/tech\/wp-json\/wp\/v2\/post\/1452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}