Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Wednesday, 14 November 2012 / Published in Woo on Tech

Petraeus-Gate and Fallacy of Email Privacy

Email Security

Apparently, even the (former) head of the CIA can fall victim to a security breach. General David Petraeus recently handed in his resignation as the leader of the US’s Central Intelligence Agency when his extra-marital affair surfaced through an investigation led by the CIA’s own sister agency, the Federal Bureau of Investigation. What’s interesting is that the FBI didn’t use exotic technology or Hollywood-esque espionage to gain access to Petraeus’ “anonymous” email account –  in the end, it boiled down to a simple, lawful, court-order through the Electronic Communications Privacy Act. Once the FBI had covert access, they were easily able to track the account usage and trace it to the General himself.

What this means for you:

What undid Petraeus – aside from lack of integrity and fidelity – wasn’t his extremely clever usage of Gmail. Once again, the subterfuge was ruined by a person – in this case, by his own mistress, Paula Broadwell, who sent threatening emails to Petraeus family friend, Jill Kelley who then got the FBI on the case. In the course of any criminal investigation, the ECPA grants the government authority to access any electronic communication without a warrant if it’s under 180 days old, and if it’s older than 180 days, then all that is needed is a court order. Even if you think you’ve set up an anonymous email account, all email travels through the internet by virtue of metadata attached to the digital envelope that is impossible to hide. Think of it as a digital postmark. And because all data must come from somewhere and go somewhere, IP addresses (and logs) make it possible to pinpoint those locations with ruthless precision. The next time you send an email that you need to be completely confidential, think carefully about the implications of it appearing on the front page of every news website in the world. Obviously, the government doesn’t have the time (or the justification) to watch everyone in America, but they certainly have the means, and will to use it, even if it undermines one of their own sacred cows.

Image courtesy of renjith krishnan / FreeDigitalPhotos.net

  • Tweet
Tagged under: affair, Broadwell, CIA, ECPA, Electronic Communications Privacy Act, email, FBI, investigation, IP address, metadata, Petraeus, security

What you can read next

Prepping for your Windows 10 upgrade
Android Logo
Android security hole has been around since 2.1
The Brain-bending Microsoft Account Pt 2

1 Comment to “ Petraeus-Gate and Fallacy of Email Privacy”

  1. Email in 2020 – Get Tech Support Now – (818) 584-6021 – C2 Technology Partners, Inc. says :Reply
    January 7, 2020 at 8:54 pm

    […] Petraeus-Gate and Fallacy of Email Privacy (2012) – TLDR: your email is not private. Seven years later, surprise surprise – still not private. […]

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Accountant working on accounting software on laptop

    What Accounting Firms Learn About Technology During Tax Season

    Tax season is the best stress test your technol...
  • Someone working on a tablet with AI

    Your Employees Are Already Using AI With Your Client Data

    You just don’t know it yet. I had a conve...
  • 3-2-1 countdown over computer language background

    The 3-2-1 Backup Rule Explained for Non-Technical Business Owners

    The 3-2-1 backup rule is one of those things th...
  • Microsoft365 vs Google

    Microsoft 365 vs. Google Workspace: Which One Actually Works for Law Firms?

    Many businesses, when trying to get their proce...
  • Backup and recovery icons for computer overlaid on people working on computers

    Your Backup Strategy Is Probably Broken (Here’s How to Fix It)

    I’ve been doing this for over three decad...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP