Presentation on theme: "The USA-Patriot Act The Basics for Information Technologies and Higher Education."— Presentation transcript:
The USA-Patriot Act The Basics for Information Technologies and Higher Education
USA-Patriot Act: Basics Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Acts Signed into law on October 26, 2001 One of the longest pieces of emergency legislation passed in one of the shortest periods of time in American history
History of Emergency Acts and Government Actions Alien and Sedition Acts of 1790s Suspension of Habeas Corpus during Civil War Abrams: Muting of Free Speech during WWI Red Scare and Palmer Raids in post WWI period
History of Emergency Acts and Government Actions FDR, Great Depression New Deal Legislation Internment of Japanese during the WWII Blacklisting and Congressional Hearings in the McCarthy, Anti-Communist Era, Post WWII era Wiretapping and general harassment of government critics in civil rights and Vietnam War era
USA-Patriot Act: Basics Ten Sections covering a variety of areas, including banking, money laundering, surveillance, border protection, victims support, information sharing within the infrastructure and the strengthening of criminal laws against terrorism. Severability clause –To protect against the whole the potential constitutional violation of a single section
Definition of Terrorism Act divides definition into two parts –Foreign –Domestic For the purposes of our discussion, the definition for domestic terrorism is the more helpful to keep in mind.
Definition of Terrorism Domestic –the term `domestic terrorism' means activities…[that ] involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State; appear to be intended (i) to intimidate or coerce a civilian population; (ii) to influence the policy of a government by intimidation or coercion; or (iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and occur primarily within the territorial jurisdiction of the United States.
Title I: Enhancing Domestic Security Against Terrorism Section 103: Increased funding for the Technical Support Center –Addition to established funding for section 811 of the Antiterrorism and Effective Death Penalty Act of 1996 –$200,000,000 addition each year for
Title I: Enhancing Domestic Security Against Terrorism Section 105: Expansion of National Electronic Crime Task Force Initiative –Director of US Secret Service shall create national task force on the New York Electronic Crimes Task Force model –Operate throughout the United States –For the purpose of preventing, detecting and investigating various forms of electronic crimes.
Overview of Title II: Enhanced Surveillance Procedures Sharing of Information –Law enforcement with federal agencies Obtaining Records –FERPA (507 of Title V) –FISA –ECPA Rewording to Include Electronic Communications –routing, network addresses, signaling
Overview of Title II: Enhanced Surveillance Procedures Computer Trespass –Deputizing owners and operators of IT New Access –Rubber Stamp and National Service for Subpoenas Compensations –FBI compensate ISP –Civil actions for computer abuse over $5,000 (814 of Title VIII).
Family Education Records and Privacy Act Originally passed in 1974, subseq. amended –Historical foundation in anti-war protests protection for students records, transparency and access of those records for the individual student –Recognize shift from in loco parentis – Already existing health and safety exception for the individual student
Family Education Rights and Privacy Act, 507 of Title V Patriot Act amends to permit educational institutions to disclose educational records to federal law enforcement officials without student consent: –If a U.S. Assistant Attorney General, or similarly ranked official, obtains a court order relevant to terrorism investigation –Institution is not liable, and need not maintain a record of the transaction –Distinct from the health and safety already existing exception directed to health and safety of others.
Ancillary to FERPA National Center for Education Statistics –Federal officials can have access to survey information, which is otherwise held confidential Monitoring of Foreign Students –Full implementation of existing Immigration and Naturalization Service law regarding information about students
Foreign Intelligence Surveillance Act 1978 Early recognition, if not prescience, about the potential for terrorist activities on American soil or affecting American interests internationally Foreign relations exception to the legislative directions towards privacy as a result of the Church Committee and reflected in acts such as Freedom of Information Act and Family Educational Records Privacy Act
Foreign Intelligence Surveillance Act FISA Court (pre-Patriot Act) –Seven federal judges »Post Patriot Act: eleven and with residence restrictions in contemplation of an increase in requests and need for quick process of them –Meet in closed session –Content of applications permanently closed –Only statistics, and annual vice-presidents report to Congress of applications and approved. –Example of Moussaoui Flight School case –Results in search warrant or subpoena »Post Patriot Act: reduced standard for approval
Patriot Act: Section 501 Amendments of FISA Business Records –FBI can seize with a court order certain business records pursuant to an investigation of international terrorism or other clandestine intelligence activities… –Prohibits record keeper to disclosure FBI action to anyone other than those persons necessary to produce the tangible things under this section… –Investigation not to be conducted of a United States person solely upon the basis of activities protected by the first amendment…
Patriot Act Amendments of FISA Query: Does this mean I cant tell my supervisor? – Chain of command –Chain of custody –But not outside of that loop! Potential for constitutional challenge under free speech? The whistleblowers ethical dilemma
Electronic Communications Privacy Act of 1986 What is it? –Wiretapping Act for the Internet What is the Wiretapping Act? –Olmstead 1928 –Katz 1967 – Omnibus Crime Control and Safe Streets Act of 1968 is the actual Wiretapping Act ECPA brings those same legal protections of telephonic communications to electronic environment
ECPA: What Does It Protect? Ideally the privacy of communications in electronic media Pre-Patriot Act list of exceptions –Usual course of business But not disclosure to third parties Wireless: distinction between listening and disclosing –Authorized law enforcement Court or Administrative Order Search Warrant or Subpoena Executive Order Letter
ECPA: To Whom Does It Apply? Statutory Language: …providers of Internet service to the public Does it apply to colleges and universities? No case law on point Anderson Consulting: EPCA does not apply Digital Millennium Copyright Act as potential safe harbor model of distinction between students and staff/faculty? Areas where there is service to the public, i.e. list serves? General Rule Act as if it does, but hold question as potential defense
Patriot Act Amendments of ECPA New emergency disclosure Imminent danger to life and limb New required disclosure Rubber-stamping subpoenas –Below probable cause –Routing: Pen registers and trap and trace devices –Content is the constitutional question
Required Disclosure: Voice Mail 209 Patriot Act/2703 Pre-Patriot Act –Obtainable only through highest level of court order corresponding to transmission (real time) of communications Like telephone wiretap order Post Patriot –Now obtainable like any Still with court order, but lower standard
Nation-Wide Service for Electronic Search Warrants Creates a national subpoena obtainable from magistrates in federal district courts which can be extended to any other jurisdiction –i.e. if FBI in Washington want something in California, they can apply for warrant in Washington federal court and have it apply to California.
Patriot Act Amendments of ECPA Computer Trespass Owner/Operator consent for federal intervention So long as owner/operator reasonably believes investigation is relevant to computer trespass Investigation of it and no other No authorization required No limits set, e.g. stop No restraint on return with authorization based on information gathered during the invited investigation No guarantee it is constitutional Sunset provision
What is Purpose of New Computer Trespass? Sections 217(1) and (2) simply alleviates owners and operators of protected computers of potential ECPA liability for their investigations and/or disclosures under certain circumstances. Facilitate communications between networks – private and public – and federal law enforcement
So What is the Worry? Autonomy of higher education to maintain its networks –The router and the FBI story Fine line between requesting and inquiry? –IP hopping or rogue scans as sign –Helpful call from federal law enforcement –Diminution of Fourth Amendment: No probable cause No judicial oversight No reasonable expectation of privacy means no exclusionary rule in court
Areas of Potential Abuse and/or Concern Constitutional –First Amendment; speech –Fourth, Fifth and Sixth criminal procedure –Separation of powers (agencies as 4 th branch) Privacy –Colleges/University Autonomy –FISA business records –FERPA new exception –ECPA disclosures
Areas of Potential Abuse and/or Concern Federalism –National service Case law definitions –Public –Emergency –Color of law –Network Addresses, Routing, Customer Information Deputized Owner –Computer Trespass – Policy and Procedure
What Must Be Done? Work together to address crime and terrorism Maintain free speech and inquiry Hold forth on our constitutional protections Import that sensibility of constitutional protections and due process into internal policies and procedures Watch and react politically depending on how this legislation makes its way into the daily life of American society
Conclusion Policy, protocols and procedures that engage the law in concert with the special mission of American higher education and the particular cultures of our colleges and universities go a long way to preserve our traditional autonomy.