Monday, February 15, 2010

USA Patriot Act Subject to Sunset

"Section of USA Act Subject to Sunset"

Section 216

The Patriot Act substantially changes the law with respect to law enforcement access to information about computer use including Web surfing. Reaching for an analogy from the old rotary dialed telephone system, the Act extends provisions written to authorize installation of pen registers and trap and trace devices, which record outgoing and incoming phone numbers, to authorize the installation of devices to record all computer routing, addressing, and signaling information. The government can get this information with a mere certification that the information likely to be obtained is relevant to an ongoing criminal investigation....Today, with more than fifty million U.S. households online, when more than 1.4 billion e-mails change hands every day, when computer users surf the Web and download files using phone lines, mobile devices, and cable modems, the government can learn a tremendous amount of information about you from where you shop to what you read to who your friends are through the use of so-called transactional records. The potential for abuse, for invasion of privacy, and for profiling citizens is high. That’s why it is disappointing that the authors of this provision settled for an incredibly weak standard of judicial oversight. A better analogy might have been to the provision of the Electronic Communications Privacy Act governing access to the stored records of Internet service providers, which permits a judge to satisfy herself that there are specific and articulable facts that the information sought is relevant and material to the ongoing investigation. This is a provision that Congress should review as part of its sunset process and amend.

Section 203

Previously, domestic law enforcement and foreign intelligence collection operated on separate tracks. This separation was seen as necessary because of the very different legal regimes that are associated with domestic law enforcement and foreign intelligence collection. The events of September 11, which involved several individuals who had lived in our country for some time, made it clear that more cooperation between domestic law enforcement and foreign intelligence collection was necessary. Section 203 facilitates this cooperation by allowing "foreign intelligence information" gathered in criminal investigations by domestic law enforcement to be shared with the intelligence community. In this manner, section 203 enables the intelligence community access to critical information that might otherwise be unavailable...The definition of "foreign intelligence information" contained in the Patriot Act is quite broad. Foreign intelligence is defined to mean "information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations, or foreign persons or international terrorist activities." The definition goes on to specifically include information about a U.S. person that concerns a foreign power or foreign territory and "relates to the national defense or the security of the United States" or "the conduct of the foreign affairs of the United States." The sharing of such a broad range of information raises the specter of intelligence agencies, once again, collecting, profiling, and potentially harassing U.S. persons engaged in lawful, First Amendment-protected activities...Section 203 provides some protection against abuse by requiring that when information originates from grand juries or wiretaps, the attorney general must establish procedures for the disclosure of "foreign intelligence information" that identifies a U.S. person. These safeguards need to be strengthened in two regards. First, to prevent unnecessary dissemination of information about a U.S. person to the intelligence community, such procedures should also be required for information obtained in domestic criminal investigations generally. Second, information subject to grand jury secrecy rules should only be disseminated with authorization from a court.

Section 206

The Foreign Intelligence Surveillance Act (FISA) facilitates domestic intelligence gathering related to foreign powers by allowing the collection of such information without the legal restrictions associated with domestic law enforcement. Section 206 of the Patriot Act modernizes FISA wiretap authority. Previously, FISA required a separate court order be obtained for each communication carrier used by the target of an investigation. In the era of cell phones, pay phones, e-mail, instant messaging, and Black Berry wireless e-mail devices such a requirement is a significant barrier in monitoring an individual’s communications. Section 206 allows a single wiretap to legally "roam" from device to device, to tap the person rather than the phone. In 1986, Congress authorized the use of roaming wiretaps in criminal investigations that are generally subject to stricter standards than FISA intelligence gathering, so extending this authority to FISA was a natural step...The main difference between roaming wiretaps under current criminal law and the new FISA authority is that current criminal law requires that law enforcement "ascertain" that the target of a wiretap is actually using a device to be tapped. Section 206 contains no such provision. Ensuring that FISA wiretaps only roam when intelligence officials "ascertain" that the subject of an investigation is using a device, before it is tapped, would prevent abuse of this provision. For example, without the ascertainment requirement, it is conceivable that all the pay phones in an entire neighborhood could be tapped if suspected terrorists happened to be in that neighborhood. Bringing FISA roaming wiretaps in line with criminal roaming wiretaps would prevent such abuse and provide greater protection to the privacy of ordinary Americans.

Section 213

The 1986 Electronic Communications Privacy Act granted the government the authority to delay notification for search of some forms of electronic communications that are in the custody of a third party. Section 213 statutorily extends the ability of law enforcement to delay the notice to any physical or electronic search with a showing that notice would create an "adverse result." This provision is an effort to improve the government’s ability to investigate suspected terrorists by granting law enforcement greater leeway to operate clandestinely. To a large extent, section 213 simply codifies existing law enforcement practice in a manner consistent with recent court decisions. Nevertheless, the "adverse result" standard (defined in 18 U.S.C. § 2705), by virtue of its ambiguity, creates the potential for abuse. As a result, section 213, which is not currently subject to the four-year sunset contained in the Act, should, nevertheless, be carefully reviewed at that time.

Section 217

If someone unlawfully enters your home, you can ask the police to enter your premise without a warrant to investigate. Section 217 clarifies that similar authority applies to "computer trespassers." This allows law enforcement, with the permission of the owner of a computer, to monitor a trespasser’s action without obtaining an order for a wiretap. This provision constrains the ability of hackers to use computers without being detected...Although most law-abiding computer users’ online activities will not be monitored by the government as a result of section 217, the new authority may be overboard. A "computer trespasser" is defined as anyone who accesses a protected computer (which includes any computer connected to the Internet) without authorization. Individuals who exceed their terms of service agreements with their Internet service provider or individuals who use their computer at work to download an MP3 file could be subject to intrusive government monitoring. While the need to respond quickly to malicious hacking, such as denial of service attacks, provides a basis for this provision, section 217 should be amended to require court authorization for monitoring of individual users that exceeds forty-eight hours in duration.

Section 218

Prior to the enactment of FISA in 1978, the intelligence community had virtually unchecked authority to conduct domestic surveillance of U.S. citizens and organizations. FISA created a special court to ensure that "the purpose" of domestic intelligence gathering was to obtain foreign intelligence information. The FISA court structure and sole purpose standard attempted to balance the need to collect foreign intelligence information without the constraints of the Fourth Amendment with increased protections for Americans exercising their First Amendment rights. But the sole purpose test has created operational difficulties for foreign intelligence investigations that uncover criminal wrongdoing and lead to an investigation of the criminal conduct. The events of September 11 further blur the line between foreign intelligence investigation and domestic law enforcement and the ability to jointly work the case and share information between the intelligence and law enforcement communities has become more important in the context of the investigations of Al Qaeda. Section 218 loosens the standard of a FISA investigation by requiring a showing that the collection of foreign intelligence information is "a significant purpose" rather than "the purpose" of an investigation. Section 218 is an important tool for counter terrorism but, since probable cause is not required under FISA, it also raises the possibility that U.S. citizens who are not terrorists could have their homes searched and communications monitored without probable cause. Therefore, section 218 deserves special attention when it expires in four years.

CONCLUSION

Many of the electronic surveillance provisions in the Patriot Act faced serious opposition prior to September 11 from a coalition of privacy advocates, computer users, and elements of high-tech industry. The events of September 11 convinced many in that coalition and overwhelming majorities in Congress that law enforcement and national security officials need new legal tools to fight terrorism. But we should not forget what gave rise to the original opposition—many aspects of the bill increase the opportunity for law enforcement and the intelligence community to return to an era where they monitored and sometimes harassed individuals who were merely exercising their First Amendment rights. Nothing that occurred on September 11 mandates that we return to such an era. If anything, the events of September 11 should redouble our resolve to protect the rights we as Americans cherish. Therefore, as the new powers granted under the Patriot Act begin to be exercised, we should not only feel more confident that our country has the tools to be safe but we should be ever vigilant that these new tools are not abused.

(John Podesta is a visiting professor of law at the Georgetown University Law Center. He served as President Clinton’s chief of staff from 1998-2001.....Section of Individual Rights & Responsibilities
American Bar Association)



Monday, January 25, 2010

"Privacy Protection and Law"



"LAW"

-.".-Privacy law -->is the area of law concerned with the protection and preservation of the privacy rights of individuals. Increasingly, governments and other public as well as private organizations collect vast amounts of personal information about individuals for a variety of purposes. The law of privacy regulates the type of information which may be collected and how this information may be used,The scope of applicability of privacy laws is called expectation of privacy.

-.".-Privacy laws can be broadly classified into:

General privacy laws--> have an overall bearing on the personal information of individuals and affect the policies that govern many different areas of information.

Specific privacy laws--> These laws are designed to regulate specific types of information.

Privacy Protection and law?


"PRIVACY PROTECTION"

-.".- To the implementation of leading-edge privacy protection technologies, PCIS can assist your organization in ensuring that your information systems are protected and your privacy protection management practices are in compliance with current privacy laws.
Privacy protection is not just about the law—it’s also about good business. If a company is publicly labeled as a privacy offender, it could prove devastating for the organization. Client distrust and poor publicity can be more damaging than legal action. Identity theft has become a growing liability for businesses and for most, the potential cost of non-compliance is simply too high.
PCIS is recognized as a leader on privacy issues and combating identity theft. Working in concert with Vancouver law firm Clark, Wilson, PCIS clients are assured they have access to the best legal and technical advice available on privacy protection management and corporate information systems security.




What is Computer Privacy?



"What is Computer Privacy?"





--> In this generation we use computers and the Internet everywhere we do our banking,read books find different kinds of information, but on the other side Internet id full of potential risk to our privacy and security. So while these are lots of things that we have gained from the Computer revolution there is a price we have to pay and the price is our "Computer Privacy",Of course there is no simple solution for this problem.

There are different tools available to help us maintain our privacy
"Anonymous Surfing Tools, Encryption Software, Clear History Software."
there are the tools on how to maintain our Privacy, when your "Personal Computer" is equipped with Privacy software it has the greatest chance of surviving privacy or security attacks.

Monday, January 11, 2010

"Computer Criminals"


"Computer Criminals"


-->Computer crime includes traditional criminal acts committed with a computer, as well as new offenses that lack any parallels with non-computer crimes. The diversity of offenses renders any narrow definition unworkable. The U.S. Department of Justice (DOJ) broadly defines computer crimes as "any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution."
---> Broad term applying to any type of crime committed via a computer, including unauthorized access to files. Most computer crime is committed by disgruntled former employees or subcontractors.
Examples include the releasing of viruses, hacking, and computer fraud. Many countries, including the USA and the UK, have specialized law enforcement units to supply the technical knowledge needed to investigate computer crime.

Who's behind criminal bot networks?

They have infected perhaps 100 million computers with viruses, turning the PCs around the world into an army of willing criminal assistants known as “bots.” They are using those PCs to send out billions of spam e-mails and make millions of dollars by attacking Web sites and extorting their owners. They have even attacked the core computers that keep the Internet running smoothly.




What is "Zero Day Attack?"



"Zero Day Attack"

"Takes place before the security community or software developer knows about a vulnerabilities or has been able to repair it...."


-->A Zero day attack also known as "a zero hour attack",takes advantage of computer vulnerabilities that do not currently have a solution.Typically a software company will discover a bug or problem with a piece of software after it has been released and will offer a patch another piece of software meant to fix the original issue.
If the vulnerability is not particularly dangerous,software producers may choose to hold off until multiple updates are collected and release them together as a package,Still this approach can potentially expose users to a "zero day attack".

Monday, January 4, 2010

what would you do?




"Step's in how to fix a problem"

--> 1. Make a little conversation in other applicant about the issues.
--> 2. Find the reason why that people making negative headlines about the manufacturing company
.
--> 3. Make a conclusion in the problem.
--> 4. and after that you can fix the security problem.

--> when you find the real reason,as a hired IT security consultant you should be alert and observance of the people who belong to your group.and make sure that you and your boss know what is the detail about the security problem so that the black sheep of your company don't have any idea..
When you found who is the black sheep of your company you must fired that person so that the problem will be okey..










-->
I will talk my friend not to do that co'z it is bad and it is not important....if the evidence will not erase all the owner will fail you a case that makes her bad....it's not right to make a joke to the big company or any people,sending virus will make people angry..!!!! so don't do that......