Former FBI Counterterrorism Agent Tim Clemente: 'No Digital Communication Is Secure'

Former FBI Agent: 'No Digital Communication Is Secure'
|
Open Image Modal

Even a former FBI agent doesn't seem comfortable with the level of surveillance his former employer exercises over Americans.

In an interview with CNN on Wednesday, former FBI counterterrorism agent Tim Clemente said that the FBI could listen to phone calls between Tamerlan Tsarnaev and his wife. "Welcome to America," he said. "All of that stuff is being captured as we speak whether we know it or like it or not."

The next day, Clemente returned to CNN, saying that "there's a way to look at digital communications in the past" and that "no digital communication is secure." Clemente specified that this type of surveillance can't be used in a criminal investigation but is used in "major terrorism investigations or counterintelligence investigations."

Watch the CNN interview below:

In an email to the Huffington Post, Christopher M. Allen from FBI Office of Public Affairs said that while he would not comment on Clemente's remarks, he did provide us with a link to congressional testimony from the bureau's former general counsel from 2011. "I can verify that the information from the testimony remains accurate," Allen said.

The testimony refers to the Communications Assistance for Law Enforcement Act (CALEA) of 1994. According to FBI counsel Valerie Caproni, the law "requires 'telecommunications carriers' to develop and deploy intercept solutions in their networks to ensure that the government is able to intercept electronic communications when lawfully authorized."

While the law covers phone networks, "CALEA does not cover popular Internet-based communications modalities such as webmail, social networking sites, or peer-to-peer services," Caproni wrote. But at a March luncheon, another FBI lawyer, Andrew Weissman, said that updating the law to let authorities monitor web activities in real time is a "top priority" of the bureau in 2013.

Surveillance has been at the top of everyone's mind since cameras were used to help find the Boston bombing suspects. Americans are having a difficult time deciding at what point their privacy is being violated more than their safety is being protected.

This essentially means that all digital communication is recorded and stored by the government, Guardian columnist Glenn Greenwald suggests. "[T]his revelation, made in passing on CNN, that every single telephone call made by and among Americans is recorded and stored is something which most people undoubtedly do not know, even if the small group of people who focus on surveillance issues believed it to be true," Greenwald wrote.

If there were a conversation somewhere out there that could make a huge difference in a terrorism case, how long would it take the FBI to find it? And at what cost?

Our 2024 Coverage Needs You

As Americans head to the polls in 2024, the very future of our country is at stake. At HuffPost, we believe that a free press is critical to creating well-informed voters. That's why our journalism is free for everyone, even though other newsrooms retreat behind expensive paywalls.

Our journalists will continue to cover the twists and turns during this historic presidential election. With your help, we'll bring you hard-hitting investigations, well-researched analysis and timely takes you can't find elsewhere. Reporting in this current political climate is a responsibility we do not take lightly, and we thank you for your support.

to keep our news free for all.

Support HuffPost

Before You Go

9 Gadgets To Help You Avoid Surveillance
Fingerprint Gel(01 of09)
Open Image Modal
The Japanese government counter-terrorism practice of fingerprinting foreigners who enter the country may have inspired Doctor Tsutomu Matsumoto to invent "fingerprinting gels", a way of faking fingerprints for scanners.Learn how to make your own here. (credit:AP)
White Noise Generator(02 of09)
Open Image Modal
Worried someone around you is secretly recording everything you do? No fear! There's a relatively low-tech way to defeat such snoops, via white-noise-producing audio jammers. These tiny devices use good ol' white noise to blur the sound picked up by hidden microphones and other surreptitious recording devices. (credit:<a href="http://www.flickr.com/" role="link" class=" js-entry-link cet-external-link" data-vars-item-name="Flickr:" data-vars-item-type="text" data-vars-unit-name="5bb364bfe4b0fa920b979dfd" data-vars-unit-type="buzz_body" data-vars-target-content-id="http://www.flickr.com/" data-vars-target-content-type="url" data-vars-type="web_external_link" data-vars-subunit-name="before_you_go_slideshow" data-vars-subunit-type="component" data-vars-position-in-subunit="29" data-vars-position-in-unit="35">Flickr:</a><a href="http://www.flickr.com/people/anonymous9000/" role="link" class=" js-entry-link cet-external-link" data-vars-item-name=" Anonymous9000" data-vars-item-type="text" data-vars-unit-name="5bb364bfe4b0fa920b979dfd" data-vars-unit-type="buzz_body" data-vars-target-content-id="http://www.flickr.com/people/anonymous9000/" data-vars-target-content-type="url" data-vars-type="web_external_link" data-vars-subunit-name="before_you_go_slideshow" data-vars-subunit-type="component" data-vars-position-in-subunit="30" data-vars-position-in-unit="36"> Anonymous9000</a>)
Phonekerchief(03 of09)
Open Image Modal
MIT's Technology Review calls it the newest, hottest Thanksgiving accessory -- but you can use phone-size "Faraday cages" like this (sold by uncommongoods) to block your cellphone's call signal, WiFi and GPS. Handy now that federal courts are ruling that cops can track suspects via cellphone sans warrant, and Apple can remotely disable your phone camera with a click. As security researcher Jacob Appelbaum said in an interview with N+1 back in April, "Cell phones are tracking devices that make phone calls." So shouldn't you be prepared for when you don't want to be tracked? (credit:uncommongoods)
LED-Lined Hat(04 of09)
Open Image Modal
Hidden cameras got you down? Blind them all with a simple baseball cap lined with infrared LEDs. Amie, a hacker on WonderHowTo, shows the world how to make one, while this German art exhibition lays out how these ingenious devices work. (credit:AP)
Bug Detector(05 of09)
Open Image Modal
These receivers reveal the telltale electronic crackle of hidden mics and cameras. Strangely enough, they were around long before "surveillance culture" became a common phrase. Today they're sold in all sorts of shops for surveillance paranoids. (credit:Gadget Playground)
Camera Map(06 of09)
Open Image Modal
Sometimes hiding your face isn't enough; sometimes you don't want to be seen at all. For those days, there's camera maps. The NYC Surveillance Camera Project is currently working to document the location of and working status of every security camera in New York City. This project has been replicated by others in Boston, Chicago and Bloomington, Indiana. Notbored.org has even published a guide to making your own surveillance camera maps (here). (credit:AP)
Dazzle Camouflage(07 of09)
Open Image Modal
Credit to artist Adam Harvey for this one. Inspired by the "dazzle camouflage" used on submarines and warships during World War I, he designed a series of face paint principles meant to fool the facial recognition schemas of security cameras. Check out The Perilous Glamour of Life Under Surveillance for some tips on designing your own camera-fooling face paint. (credit:Adam Harvey)
Throwaway Cellphone(08 of09)
Open Image Modal
Walmart may be the premier symbol of corporate America, but its disposable cellphone selection can help you start a thoroughly maverick lifestyle. $10 TracFones work on most major networks, including AT&T, T-Mobile, Sprint and Verizon, and come with minutes prepaid so you can dispose of the devices when you're done. (credit:AP)
RFID-Blocking Wallet(09 of09)
Open Image Modal
Radio-Frequency Identification (RFID) chips are now regularly implanted in passports, ID cards, credit cards and travel papers. These tiny chips make machine-reading your documents easier -- but could also let anyone with the right type of scanner scrape your information and track your whereabouts. Luckily, gadget geeks have come to the rescue again, this time with RFID-blocking wallets. Working on the same principle as the "phonekerchief", these wallets create a Faraday cage around your items, keeping their data secure until you take them out to be scanned where they're supposed to be scanned. Destroying the chip is simpler: just nuke it in the microwave for five seconds. Of course, whatever you're microwaving might burst into flames first... (credit:AP)