The USA PATRIOT Act Part 2 YSU – Weapons of Mass Destruction Session 11a.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
©The USA PATRIOT Act and You: A Legal Update Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford,
Lesson 3 Cyber Legal Environment: One of the Prime Drivers for Incident Response.
2 Language of Computer Crime Investigation
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Cyber Crimes: Online Ticketing Fraud By: Erin Dobbs, Blaine Skrainka, Nick Worth, Kyle Stamper, Suzy Kiska.
USA Patriot Act Presented by: Kisha Thompson. Objectives potential threats potential vulnerabilities potential legal exposure To determine how the USA.
Legal Considerations in Obtaining Electronic Evidence in Online Investigations CSC 486/586 1.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
Is the Patriot Act Too Great a Threat to Our Civil Liberties? Michelle Schoonmaker Shane Fuhrman Rachel Almy Stacey Cremar.
NC State University - March David Drooz1 USA PATRIOT Federal anti- terrorism law Effective October 26, 2001 December 31, 2005, sunset for some of.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Anti-Money Laundering and OFAC Compliance for Transfer Agents SSA Annual Conference July 25, 2008.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Anti-Terrorism Legislation and Campus Computing Tracy Mitrano, Cornell Barbara Simons, Stanford Rodney Petersen, Maryland Copyright Tracy Mitrano, Rodney.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
The 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Regulating and Prosecuting Global Money Laundering
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Global Treasury Services Latin America Operating Risk.
Federal Bureau of Investigation
Class 11 Internet Privacy Law Government Surveillance.
Other Laws (Primarily for E-Government) COEN 351.
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
The Patriot Act Protecting the US or Violating People’s Freedoms.
‘The United Kingdom Anti-Fraud Policy - A Critical Review’ Wales Fraud Forum 2 nd Annual Conference Dr Nicholas Ryder Head of Commercial Law Research Unit.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Forensic and Investigative Accounting
The USA PATRIOT Act Session 10 YSU Weapons of Mass Destruction Course.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
USE OF BSA REPORTING BY THE FBI. BSA Requirements The regulators Your customer Money Laundering – traditional targets.
Record Keeping How should our data be handled? Katie Fore.
The USA PATRIOT Act An Overstatement of ALA Concerns?
Chapter 18 - The Fourth Amendment and National Security.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Cybersecurity : Optimal Approach for PSAPs
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
The Patriot Act Is Spying on US citizens Ethical?
Mr. Gordon March 31, Appreciations, Concerns, Announcements Pre-test and Post-Test Important to take notes in class… Post-test and Final Exam Presentation.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
STUDENT RIGHTS MINI-WRITE On a half sheet of paper write at least two paragraphs on the following questions: What rights do you have when you come to school?
Forensic and Investigative Accounting
Overview Our Ethics Today’s Criminal Justice System
Legal Implications.
Department of Justice (DOJ)
Forensics Week 3.
Chapter 4 Law, Regulations, and Compliance
Forensic and Investigative Accounting
The Right to Privacy vs. National Security
Presentation transcript:

The USA PATRIOT Act Part 2 YSU – Weapons of Mass Destruction Session 11a

Continuing Our Study Computer Security E-Infrastructure Protection Electronic Commerce Electronic Government Internet Privacy

Computer Security Nationalizes task force for e-crimes New York E-Crimes Task Force Allows interception of trespassers Computer fraud – predicate offense With warrant AG may obtain Sources of payment Session times Temporary IP addresses

Computer Security Reiterates cable co. responsibility Nationalizes trap & trace orders Including any investigation warrant New Crimes Change or abuse programs/websites Extends statute of limitations

Computer Security New penalties 1 st offense to 10 years 2 nd offense to 20 years Offense to attempt $50 million for... Regional cybersecurity forensics

E-Infrastructure Protection Title VII – one section “701” Requires security of information sharing networks Section 1016 Defines critical systems and assets whose destruction or incapacity would have devastating effects on the US and requires increased security measures

Modeling Crimes The act appropriates money for the creation of a National Infrastructure Simulation and Analysis Center out of the DOD Defense Threat Reduction Agency Budget.

Electronic Commerce “29 million American shoppers made purchases on-line during the 4 th quarter of 2001, spending $392 million.” Pew Internet and American Life Project

Electronic Commerce Banks to prevent and detect laundering 9-11 terrorists wired $ frequently Immunity to companies Disclosing suspicious activity Money order agents registry

Electronic Commerce Hawla A system of money exchange in the Middle East that runs parallel to the banking system.

Electronic Government “Using information technology ad the Internet to improve the delivery of government services to citizens, business and other agencies.” M.S. Smith et al, The Internet and the USA PATRIOT Act

Electronic Government FinCEN for G-2-G and G-2-C Elevated security to comm. Networks State Dept. & INS can access FBI Tasks NIST – Develop a standard for ID Enhancement for automated fingerprints

Electronic Government State Dept. shares info with other govts. Prevents issuance of visas AG must implement an “integrated entry and exit system” w/biometrics + TR docs. Info sharing with airlines International background checks on HAZMAT

Internet Privacy Carnivore Session times and duration may be subpoenaed ISP may divulge records (not communications) – if suspect activity Routing and addressing added to trap and trace

Internet Privacy Contents may be divulged by ISP if danger of death or physical injury Computer trespasser may be intercepted Nationwide search warrants for Many of these do not sunset