The Basics for Information Technologies and Higher Education

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Privacy of Communications: Snail Mail to Telephones.
©The USA PATRIOT Act and You: A Legal Update Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford,
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
USA Patriot Act Presented by: Kisha Thompson. Objectives potential threats potential vulnerabilities potential legal exposure To determine how the USA.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
PPA 573 – Emergency Management and Homeland Security Lecture 9a– Homeland Security and Civil Liberties: USA Patriot Act.
The PATRIOT Act and Libraries Abby A. Goodrum April 15th, 2005.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Anti-Terrorism Legislation and Campus Computing Tracy Mitrano, Cornell Barbara Simons, Stanford Rodney Petersen, Maryland Copyright Tracy Mitrano, Rodney.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Presidential War Powers After September 11, 2001.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Privacy and ITs Discontents. Premise “The liberty of the individual is no gift of civilization. It was greatest before there was any civilization, though.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Class 11 Internet Privacy Law Government Surveillance.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Other Laws (Primarily for E-Government) COEN 351.
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Bell Work: 5/8/13 What is seditious speech? What is prior restraint?
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Changes Provoked by the 9/11 Attack  Various changes in the U.S. legislation  Exceptional number of adopted policies  Change of Americans’ perceptions.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
The USA PATRIOT Act An Overstatement of ALA Concerns?
Chapter 18 - The Fourth Amendment and National Security.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
“Congress lets the NSA run Amok” Jeffrey Rosen. Congress, NSA and President: Congress, NSA and President: Let Courts Deal with It Two NSA programs: 1)
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
NOTES 2 & TEST REVIEW CIVIL RIGHTS AND LIBERTIES.
Unit 2: Chapter 17.  Attacks on September 11, 2001 shook America to its core  Largest on U.S. soil since World War II  Feeling of vulnerability  Congress.
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Surveillance around the world
Courts System Search Warrants.
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Evolutionary Powers of the Presidency Not mentioned in the Constitution… 1.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
How Does Electronic Surveillance Work Legally?
Confidential Records and Protected Disclosures
U.S. Department of Justice
DO NOW.
Laws Governing Police Surveillance
Electronic Surveillance, Post 9/11
The Right to Privacy vs. National Security
Presentation transcript:

The Basics for Information Technologies and Higher Education The USA-Patriot Act The Basics for Information Technologies and Higher Education

USA-Patriot Act: Basics Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Acts Signed into law on October 26, 2001 One of the longest pieces of emergency legislation passed in one of the shortest periods of time in American history

History of Emergency Acts and Government Actions Alien and Sedition Acts of 1790’s Suspension of Habeas Corpus during Civil War Abrams: Muting of Free Speech during WWI Red Scare and Palmer Raids in post WWI period

History of Emergency Acts and Government Actions FDR, Great Depression New Deal Legislation Internment of Japanese during the WWII Blacklisting and Congressional Hearings in the McCarthy, Anti-Communist Era, Post WWII era Wiretapping and general harassment of government critics in civil rights and Vietnam War era

USA-Patriot Act: Basics Ten Sections covering a variety of areas, including banking, money laundering, surveillance, border protection, victims’ support, information sharing within the infrastructure and the strengthening of criminal laws against terrorism. Severability clause To protect against the whole the potential constitutional violation of a single section

Definition of Terrorism Act divides definition into two parts Foreign Domestic For the purposes of our discussion, the definition for domestic terrorism is the more helpful to keep in mind.

Definition of Terrorism Domestic “the term `domestic terrorism' means activities…[that ] involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State; appear to be intended (i) to intimidate or coerce a civilian population; (ii) to influence the policy of a government by intimidation or coercion; or (iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and occur primarily within the territorial jurisdiction of the United States.

Title I: Enhancing Domestic Security Against Terrorism Section 103: Increased funding for the Technical Support Center Addition to established funding for section 811 of the Antiterrorism and Effective Death Penalty Act of 1996 $200,000,000 addition each year for 2002-2004

Title I: Enhancing Domestic Security Against Terrorism Section 105: Expansion of National Electronic Crime Task Force Initiative Director of US Secret Service shall create national task force on the New York Electronic Crimes Task Force model Operate throughout the United States For the purpose of “preventing, detecting and investigating various forms of electronic crimes.”

Overview of Title II: Enhanced Surveillance Procedures Sharing of Information Law enforcement with federal agencies Obtaining Records FERPA (507 of Title V) FISA ECPA Rewording to Include Electronic Communications “routing,” “network addresses,” “signaling”

Overview of Title II: Enhanced Surveillance Procedures Computer Trespass Deputizing owners and operators of IT New Access “Rubber Stamp” and National Service for Subpoenas Compensations FBI compensate ISP Civil actions for computer abuse over $5,000 (814 of Title VIII).

Patriot Act Amends Existing Legislation FERPA Family Education Records and Privacy Act 1974 FISA Foreign Intelligence Surveillance Act 1978 ECPA Electronic Communications Privacy Act 1986

Family Education Records and Privacy Act Originally passed in 1974, subseq. amended Historical foundation in anti-war protests protection for students’ records, “transparency” and access of those records for the individual student Recognize shift from in loco parentis Already existing “health and safety” exception for the individual student

Family Education Rights and Privacy Act, 507 of Title V Patriot Act amends to permit educational institutions to disclose educational records to federal law enforcement officials without student consent: If a U.S. Assistant Attorney General, or similarly ranked official, obtains a court order relevant to terrorism investigation Institution is not liable, and need not maintain a record of the transaction Distinct from the “health and safety” already existing exception directed to health and safety of others.

Ancillary to FERPA National Center for Education Statistics Federal officials can have access to survey information, which is otherwise held confidential Monitoring of Foreign Students Full implementation of existing Immigration and Naturalization Service law regarding information about students

Foreign Intelligence Surveillance Act 1978 Early recognition, if not prescience, about the potential for terrorist activities on American soil or affecting American interests internationally Foreign relations exception to the legislative directions towards privacy as a result of the Church Committee and reflected in acts such as Freedom of Information Act and Family Educational Records Privacy Act

Foreign Intelligence Surveillance Act FISA Court (pre-Patriot Act) Seven federal judges Post Patriot Act: eleven and with residence restrictions in contemplation of an increase in requests and need for quick process of them Meet in closed session Content of applications permanently closed Only statistics, and annual vice-president’s report to Congress of applications and approved. Example of Moussaoui Flight School case Results in search warrant or subpoena Post Patriot Act: reduced standard for approval

Patriot Act: Section 501 Amendments of FISA Business Records FBI can seize with a court order certain business records pursuant to an investigation of “international terrorism or other clandestine intelligence activities…” Prohibits record keeper to disclosure FBI action to anyone “other than those persons necessary to produce the tangible things under this section…” Investigation “not to be conducted of a United States person solely upon the basis of activities protected by the first amendment…”

Patriot Act Amendments of FISA Query: Does this mean I can’t tell my supervisor? Chain of command Chain of custody But not outside of that loop! Potential for constitutional challenge under free speech? The “whistleblower’s” ethical dilemma

Electronic Communications Privacy Act of 1986 What is it? Wiretapping Act for the Internet What is the “Wiretapping Act?” Olmstead 1928 Katz 1967 Omnibus Crime Control and Safe Streets Act of 1968 is the actual “Wiretapping Act” ECPA brings those same legal protections of telephonic communications to electronic environment

ECPA: What Does It Protect? Ideally the privacy of communications in electronic media Pre-Patriot Act list of exceptions Usual course of business But not disclosure to third parties Wireless: distinction between listening and disclosing Authorized law enforcement Court or Administrative Order Search Warrant or Subpoena Executive Order 12333 Letter

ECPA: To Whom Does It Apply? Statutory Language: “…providers of Internet service to the public” Does it apply to colleges and universities? No case law on point Anderson Consulting: EPCA does not apply Digital Millennium Copyright Act as potential “safe harbor” model of distinction between students and staff/faculty? Areas where there is service to the public, i.e. list serves? General Rule Act as if it does, but hold question as potential defense

Patriot Act Amendments of ECPA New “emergency” disclosure “Imminent danger to life and limb” New “required disclosure” “Rubber-stamping subpoenas” Below “probable cause” “Routing:” Pen registers and trap and trace devices Content is the constitutional question

Required Disclosure: Voice Mail 209 Patriot Act/2703 Pre-Patriot Act Obtainable only through highest level of court order corresponding to transmission (real time) of communications Like telephone wiretap order Post Patriot Now obtainable like any e-mail Still with court order, but lower standard

Nation-Wide Service for Electronic Search Warrants Creates a “national subpoena” obtainable from magistrates in federal district courts which can be extended to any other jurisdiction i.e. if FBI in Washington want something in California, they can apply for warrant in Washington federal court and have it apply to California.

Patriot Act Amendments of ECPA Computer Trespass Owner/Operator consent for federal intervention So long as owner/operator reasonably believes investigation is relevant to computer trespass Investigation of it and no other No authorization required No limits set, e.g. stop No restraint on return with authorization based on information gathered during the invited investigation No guarantee it is constitutional Sunset provision

What is Purpose of New Computer Trespass? Sections 217(1) and (2) simply alleviates owners and operators of protected computers of potential ECPA liability for their investigations and/or disclosures under certain circumstances. Facilitate communications between networks – private and public – and federal law enforcement

So What is the Worry? Autonomy of higher education to maintain its networks The “router” and the FBI story Fine line between requesting and inquiry? IP hopping or rogue scans as sign Helpful call from federal law enforcement Diminution of Fourth Amendment: No “probable cause” No “judicial oversight” No “reasonable expectation of privacy” means no exclusionary rule in court

Areas of Potential Abuse and/or Concern Constitutional First Amendment; speech Fourth, Fifth and Sixth criminal procedure Separation of powers (agencies as 4th branch) Privacy Colleges/University Autonomy FISA “business records” FERPA new exception ECPA disclosures

Areas of Potential Abuse and/or Concern Federalism National service Case law definitions “Public” “Emergency” “Color of law” “Network Addresses,” “Routing,” “Customer Information” Deputized “Owner” Computer Trespass Policy and Procedure

What Must Be Done? Work together to address crime and terrorism Maintain free speech and inquiry Hold forth on our constitutional protections Import that sensibility of constitutional protections and due process into internal policies and procedures Watch and react politically depending on how this legislation makes its way into the daily life of American society

Conclusion Policy, protocols and procedures that engage the law in concert with the special mission of American higher education and the particular cultures of our colleges and universities go a long way to preserve our traditional autonomy.