Federal law enforcement routinely tracks individuals through their credit cards, cell phones, car rentals and even store customer loyalty programs without obtaining a warrant, an online privacy activist has discovered.
According to a document obtained from the Department of Justice by privacy activist Christopher Soghoian, federal agents working on a criminal investigation can draw up their own paperwork requesting that credit companies and retailers give the agents real-time access to purchases made by a particular person. No court reviews these orders, and the only role courts play in the process is to issue a non-disclosure order to the retailer or credit card companies involved, meaning the person being tracked will never be notified of the surveillance.
The process is known as a “HotWatch,” and it can be used to spy on cell phones, credit card use, purchases at stores when a customer loyalty card is used, car rentals, and flight ticket purchases. The process “sidestep[s] any Fourth Amendment protections,” Soghoian wrote.
“A search of Google, Lexisnexis and Westlaw revealed nothing related to ‘HotWatch’ orders, and so I filed a FOIA request to find out more. If the government ‘routinely’ applies for and obtains HotWatch orders, why wasn’t there more information about these?”
A year-and-a-half and an appealed decision later the Justice Department released a document outlining “HotWatches.” 
Examples of government surveillance in our lives never seem to end. Virtually any international phone call or e-mail we make or receive is subject to warrantless electronic eavesdropping. We have the Transportation Security Administration taking naked scans of air travelers. The Drug Enforcement Administration is dangling federal dollars in front of state officials as an inducement for them to electronically track and data base medications prescribed by doctors to patients.
The federal law enforcement has the ability to track credit card purchases, travel agreements, cell phones and so-called loyalty cards â€“ such as a “Kroger Plus Card” â€“ in real-time and without a warrant.
As noted above, a document obtained through a Freedom of Information Act request by privacy blogger Christopher Soghoian, shows how the feds are doing this. First, the government contacts a credit card company’s security department, then, issues a subpoena and a court order for non-disclosure to obtain the records of an individual under investigation; these subpoenas are known as “HotWatch” orders.
The language employed by the federal agents suggests that law enforcement should ask companies for “[a]ny and all record and information relating directly or indirectly to any and all of the following person(s), entities, account numbers, address and other matters or things specified below.”
The traditional route of pursuing a search warrant from a judge â€“ the method required by the Fourth Amendment to the Constitution â€” is noted as a possible method of obtaining these records; but the document makes it clear that ignoring Fourth Amendment protections by not obtaining a warrant is the “preferred way.”
Another troubling aspect of the “HotWatch” program is that it was meant to be secret. The only mention of the program prior to Soghoian’s recent FOIA request came in 2005 when the Electronic Frontier Foundation was engaged in a lawsuit against the federal government’s use of cell phones to track individuals without warrants.
The government response to EFF noted that “the government routinely applies for and upon a showing of relevance to an ongoing investigation receives ‘HotWatch’ orders issued pursuant to the All Writs Act. Such orders direct a credit card issuer to disclose to law enforcement each subsequent credit card transaction effected by a subject of investigation immediately after the issuer records that transaction.”
Unfortunately, there is no paper trail available to provide clues as to how often these “HotWatch” orders are used, or for how long; and the Congress has engaged in no oversight of the program. All we know is it is being used “routinely” in federal investigations.
If history is any guide, however, abuse is of this program is likely. According to a report by the Washington Post earlier this year, the FBI collected more than 2,000 telephone records from telecommunications companies by invoking a “terrorist threat” that did not exist. The Bureau was in frequent violation of the Electronic Communications Privacy Act when obtaining these records.
In 2007, an internal FBI audit into the use of National Security Letters (NSL) found more than 1,000 violations of the law when it came to collecting data on Americans, including financial transactions.
The use of NSLs was greatly expanded after passage of the USA PATRIOT Act in 2001, and these devices are used with great frequency. Julian Sanchez, a research fellow at the Cato Institute, notes that the FBI issued nearly 25,000 such letters in 2008. Information gathered through NSLs is retained by the government.
“The FBI maintains a vast database that now houses over 1.5 billion government and private-sector records, on the theory that all that data can be ‘mined’ to spot suspicious patterns,” wrote Sanchez in an October 2009 article at the American Prospect on reforming the USA PATRIOT Act; which has been used routinely in recent years to investigate a wide range of matters having nothing to do with terrorism.
The HotWatch Program is yet another in a lengthening list of secret government surveillance programs severely lacking in basic privacy and constitutional safeguards. This one puts at risk the privacy of virtually every credit card transaction in which Americans daily engage. 
Keep it in mind that Big Brother can track every purchase you make on-line and with a credit/debit card, loyalty card or check.
Tencer, Daniel. “Feds tracking credit cards, store purchases without warrants.” Raw Story. 12.03.2010. www.rawstory.com/rs/2010/12/feds-credit-cards-without-warrant. & www.scribd.com/doc/44542244/DOJ-powerpoint-presentation-on-Hotwat ch-surveillance-orders-of-credit-card-transactions.
 http://blogs.ajc.com/bob-barr-blog/2010/12/10/operation- %E2%80%9Chotwatch%E2%80%9D-tracks-credit-card-use/