{"id":16875,"date":"2015-04-21T09:51:16","date_gmt":"2015-04-21T14:51:16","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=16875"},"modified":"2015-04-21T10:13:49","modified_gmt":"2015-04-21T15:13:49","slug":"nytimes-report-seeks-overhaul-of-postal-service-surveillance-program","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=16875","title":{"rendered":"NYTimes: Report Seeks Overhaul of Postal Service Surveillance Program"},"content":{"rendered":"<p>NYTimes: <a href=\"http:\/\/www.nytimes.com\/2015\/04\/22\/us\/report-seeks-overhaul-of-postal-service-surveillance-program.html?_r=0\">Report Seeks Overhaul of Postal Service Surveillance Program<\/a> by Ron Nixon:<\/p>\n<p>U.S. Postal Service Logging All Mail for Law Enforcement<\/p>\n<blockquote><p>WASHINGTON \u2014 A Postal Service surveillance program that records the information on the outside of letters and packages delivered to people suspected of criminal activity should be overhauled because of a lack of oversight, according to a report by a national defense lawyers\u2019 group.<\/p>\n<p>An audit by the service\u2019s inspector general last year found that about 20 percent of the orders for surveillance under the program, known as mail covers, were improperly approved. The New York Times reported on abuses in the program, including a case in which law enforcement officials in Arizona used it to investigate a political opponent.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>NYTimes: Report Seeks Overhaul of Postal Service Surveillance Program by Ron Nixon: U.S. Postal Service Logging All Mail for Law Enforcement WASHINGTON \u2014 A Postal Service surveillance program that records the information on the outside of letters and packages delivered &hellip; <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=16875\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76],"tags":[],"class_list":["post-16875","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/16875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16875"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/16875\/revisions"}],"predecessor-version":[{"id":16876,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/16875\/revisions\/16876"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}