Waiting for the “Access” Axe to Fall: New Investigatory Assistance Legislation for Canada PST-2005 St Andrews, NB David A Townsend UNB-Law & NRC-IIT 12.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
Freedom of Information Act 2000 and the PCT Audit Procedure Background: The Act was passed in November The Act will be fully in force by January.
John Palatiello, MAPPS Executive Director Kevin Pomfret, Centre for Spatial Law and Policy presentation to NGAC December 7, Washington, DC.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Basics of Privacy TC 310 June 16, Protections of Privacy Not explicitly protected (by Right)‏  Fourth Amendment is closest Penumbra Protection.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
1 CRIMINAL LAW (FORENSIC PROCEDURES) AMENDMENT BILL [B ]: ISSUES FOR CONSIDERATION AND COMPARATIVE ANALYSIS 6 October 2009 Sueanne S. Isaac.
131 Privacy 2. DOJ Position “Visit DOJ's new website launched to educate Americans about how we are preserving.
The USA PATRIOT Act Part 2 YSU – Weapons of Mass Destruction Session 11a.
Use of telecommunications data in fighting crime legally and effectively.
Federal Bureau of Investigation
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Cybersecurity Governance in Ethiopia
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Computer Forensics Principles and Practices
CALEA Communications Assistance for Law Enforcement Act October 20, 2005.
ISPs – Internet’s Secret Police? Ian Kerr Canada Research Chair in Ethics, Law & Technology Université D’ Ottawa University of Ottawa Faculté de droit.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Information Management in Telco: A Legal Perspective Sheila Tormey Barlow Lyde & Gilbert LLP Ronan Lupton Barrister at Law 17 September 2009.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
ISPA Internet Week Regulatory Session The Regulation of Interception of Communications (RIC) Bill 12 September 2002 Tracy Cohen.
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
Communications Data Consultations on access and a Code of Practice for voluntary retention Simon Watkin Home Office.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
Role of Montana State Fund. Montana State Fund is committed to the health and economic prosperity of Montana through superior service, leadership and.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
UNSW CLE 19 July Privacy and Law enforcement in the on-line world – the bigger picture. Nigel Waters Convenor, Australian Privacy Charter Council.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Cellular Records Review and Analysis Part 2: Verizon.
EU Data Retention Directive Team 5 March 21 st, 2006 Jeff Barger Jin Qiu Hunang Tim Schultz Tim Reiner.
Digital Forensics and Hand Held Devices Robert Trimble COSC
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Privacy and the Law.
Surveillance around the world
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Lesson # 7 A Practical Guide to Computer Forensics Investigations
War on Terror.
Wiretapping and Encryption
Red Flags Rule An Introduction County College of Morris
Pre-Trial Procedures Search and Seizure.
HIPAA Overview.
The Right to Privacy vs. National Security
Presentation transcript:

Waiting for the “Access” Axe to Fall: New Investigatory Assistance Legislation for Canada PST-2005 St Andrews, NB David A Townsend UNB-Law & NRC-IIT 12 October 2005

Overview: Parliament – to introduce lawful access Bill Design, operation and costing of almost all ‘public’ networks will be impacted (wire-line, wireless and Internet) Future - network architecture, applications and services must be ‘access compliant’ “Access” = handover by Telecom. Service Provider (TSP) of specified Subscriber- related data to Law Enforcement Agencies (LEAs) upon lawful demand

Many challenges: Technical, Legal and Social challenges: 1) Done lawfully (Charter, Crim. Code, evidence law, privacy law and international obligations) 2) Does not undermine public trust (appropriate judicial oversight and public accountability) 3) Does not inhibit public networks (competitive forces, cost structures, rollout of new technologies and services, cust. relationship) 4) Done in technology-neutral manner (strive for uniform ‘expectation of privacy’ for all e-communication – inc. and SMS) 5) Need laws based upon first principles and not a legislative extension from common carrier era 6) Significant period for training and adjustment

Current Legislation: 1974 Crim. Code wiretaps (Protect Privacy) 1993 Code amended (s21 of CSIS in 1984) – Search warrants s.487. (1) – General investigative warrants s – Suspect tracking warrants s – Dig. Number Recorder (DNR) warrants s – Production of telephone records s.492.2(2) – Interception (wiretap) warrants s.186 and ss (3), 184.3(6) and 188.(2)

Current Leg. Con’t. – Assistance Orders (for all 6 warrants) s – 2 new Production Orders s & (general and specific info.) Code attempted to match intrusiveness with quantum of evidence necessary for judge Charter case law of 1990s offered good check on state surveillance powers & activities But, Code is 13 ‘telecom years’ out of date ! And, Code not address methodology, cost recovery or lack of network capacity

Network Capacity & Methodology for Cellular Analog cellular introduced 1985 – Fairly easy to intercept (scanners, UHF tuners) – Gov’t had low expectations of privacy Digital (PCS) cellular introduced 1995 – Interception difficult - encoding and encryption – FBI pressed Canada to add intercept requirements – 23 distinct requirements added as licence conditions under Radiocommunication Act (done quietly) – Similar conditions in USA, New Zealand & Australia

What do LEAs want ? General investigatory information: – Subcriber name, address, phone number, local service provider (LSPID) – LEAs pressed for national database, paid for by subscribers, available to LEAs w/o a warrant Targeted investigations: – Subcriber name, address, phone number, device number (e.g. ESN), service provider (LSPID), dynamic IP addr. – Best available location-based information – Detailed network transaction data – For wiretap – 100% of transaction data, location data and communication content – Immediate preservation of specified data

Implications of Subscriber DB National Subscriber Data Base – very onerous and expensive for telecom industry – Thwart anonymous use of telcom. (pay-as-you- go, calling cards, anonymous , blogging) – Warrantless access by LEAs undermines current privacy protections for subscriber info. – Subscriber Data Base facilitates data-matching and data mining (including profiling)

Location Implications: Location-based Information: – Location data will become increasingly precise (tracking in real time or historic track) – Precision tells much about what target is doing – Technology no longer an assist to physical surveillance – What evidential burden must be met to secure relevant tracking warrant from a judge? – What use in civil cases?

IP Data Challenges: Many IP data challenges: – For 100% of transaction, location and content data the Service Provider must isolate, preserve and hand-over mass quantities of targeted data – Isolation, processing and preservation by TSPs raises significant forensic evidence issues – Intercept warrants often sought against number of targets = storage capacity challenges for TSP

IP Data Challenges – con’t: Warrants for Transaction Data (only): – No parallel to historic ‘DNR Order’ – IP transactional data may include: the dialling, routing, addressing, signaling information that may provide the origin, direction, timing, duration, type and size of a e-communication. – For and web surfing the transactional data may provide everything but the content – But…the content may be unnecessary – What evidential burden must be met by LEAs?

Path to ‘Access’ Legislation: Federal gov’t commissioned background studies in August release of “Lawful Access Consultation Document” – Significant criticism = lack of justification and specifics, failure to understand technology Comment period extended to mid December 2002 Over 300 submissions tendered

On the Path in Series of public and private consultations followed Spring 2003 gov’t introduced Bill C-46 (now Bill C-13). (s and s ) – Bill C-13 (passed March 22.04) added a general and specific data ‘production order’ to Crim. Code for investigation of serious corporate fraud. Came into force in September Also in Spring 2003 gov’t introduced Bill C-32 (now Bill C-14).) – Bill C-14 (passed April 21.04) provided a new exception in Code to unlawful interception for managers of computer systems who intercept to protect their networks

The Path ends in November? August 2003 DOJ released summary of consultations New rounds of selective consultations held in Drafts of policy package shared quietly with key stakeholders in Spring 2005 Commitment to introduce Bill in Fall 2005