The firestorm of controversy

Size: px
Start display at page:

Download "The firestorm of controversy"

Transcription

1 US Government Eavesdropping on Electronic Communications: Where Are We Going? by konrad l. trope The firestorm of controversy from the June 2013 revelations by Edward Snowden of the unprecedented scope of government eavesdropping on electronic communications has enveloped people from all degrees of the political spectrum. Moreover, the controversy seems to keep growing with monthly, if not weekly, developments that keep fueling the maelstrom. Interestingly, it seems that most members of the public and the media perceived the eavesdropping or data-gathering activity by the National Security Agency (NSA) as the first indication of any large-scale telecommunication interception or telecommunication data gathering by the US government. Nothing could be further from the truth. Wiretapping by the federal government has been the subject of Supreme Court decisions dating back as far as By 1962, Congress established the core statutory basis for interception of telecommunications that continues to the present. Indeed, since 1994, Congress has passed additional critical legislation, which various agencies have implemented, that has greatly expanded the breadth and depth of government interception of private citizen communications. In short, the NSA is perhaps only the newest publicly identified player within the federal government s arsenal of telecommunication interception. Second, and related to the first, many articles and comments posted on the Internet indicate a lack of knowledge Konrad Trope is the managing shareholder of Centurion Law Group, P.C., located in Beverly Hills, California. Mr. Trope serves an international clientele focusing on technology, ecommerce, telecommunications, health care, and intellectual property matters. He currently is active with the Health Law and Life Sciences Committee and the Cyberspace Committee of the ABA Business Law Section. He formerly served as the chairman of the American Bar Association s Section of Science & Technology Law s VoIP Committee.

2 about the relationship between developing technologies in communication and the legislative and regulatory mandates implemented to access use those technologies for telecommunication interception. The purpose of this article is to provide a description of the recent expansion of electronic government eavesdropping. [For a brief history of government wiretapping along with an examination of government interception of private citizen communications, please visit our magazine website at org/publications/scitech_lawyer/web_ exclusives/government_eavesdropping_ communications_how_get_here.html.] The article then closes with a brief synopsis of recent developments and suggestions regarding where the debate between national security and information privacy seems to be heading. Expansion of Government Eavesdropping A new method of communicating is creating intriguing services that beat old ways of sending information. But law enforcement makes a somber claim: these new networks have become a boon to criminals and terrorists unless the US government can easily listen in. This was the position in the mid- 1990s when the Clinton administration supported and achieved the passage of the Communications Assistance Law Enforcement Act (CALEA), which is codified at 47 U.S.C. sections CALEA s purpose is to enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in surveillance capabilities, allowing federal agencies to monitor all telephone, broadband Internet, and VoIP traffic in real-time. The original reason for adopting CALEA was the Federal Bureau of Investigation s (FBI) worry that increasing use of digital telephone exchange switches would make tapping phones at the phone company s central office harder and slower to execute or (in some cases) impossible. Because the original requirement to add CALEAcompliant interfaces required phone companies to modify or replace hardware and software in their systems, Congress included funding for a limited time to cover such network upgrades. CALEA was passed into law on October 25, 1994, and came into force on January 1, However, the FBI was not satisfied with just asking manufacturers and carriers to make their equipment CALEA compliant. By the mid-1990 s, the FBI foresaw the explosive growth of the Internet as a means by which criminals and terrorists could take advantage of and electronic communications. Thus, the FBI decided to develop its own system for monitoring the Internet called Carnivore. Carnivore, later renamed DCS1000, was a system designed to monitor and electronic communications. It used a customizable packet sniffer that can monitor all of a target user s Internet traffic. Carnivore was implemented in October Carnivore grew out of an earlier FBI project called Omnivore, which itself replaced an older surveillance tool migrated from the US Navy by FBI Director of Integrity and Compliance Patrick W. Kelley, which had a still undisclosed name. In September 1998, the FBI s Data Intercept Technology Unit (DITU) in Quantico, Virginia, launched a project to migrate Omnivore from Sun s Solaris operating system to a Windows NT platform. This was done to facilitate the miniaturization of the system and support a wider range of personal computer (PC) equipment. The resulting system was named Carnivore. The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable disk drive. This computer must be physically installed at an Internet service provider (ISP) or other location where it can sniff traffic on a LAN segment to look for messages in transit. The technology itself was not highly advanced it used a standard packet sniffer and straightforward filtering. The critical components of the operation were the filtering criteria. To accurately match the appropriate subject, an elaborate content model was developed. As the 21st century commenced, law enforcement and related agency authority to engage in data interception was greatly expanded. The USA PATRIOT Act, enacted following the attacks of September 11, 2001, made several changes to US law intended to combat terrorism. It expanded the ability of law enforcement agencies to search communications, medical, and financial records. It also extended the use of wiretaps to include Internet connections. Also, the Bush administration authorized the NSA to conduct warrantless domestic wiretaps in 2001, possibly earlier. This was first revealed in the media in The New York Times in December The FBI eventually dropped Carnivore in 2005, in favor of commercial software packages such as NarusInsight; frequent cooperation from ISPs often made the technology unnecessary anyway. Post-Carnivore Government Eavesdropping In the years since CALEA was passed, it has been greatly expanded to include all VoIP and broadband Internet traffic. From 2004 to 2007 there was a 62 percent growth in the number of wiretaps performed under CALEA and more than 3,000 percent growth in interception of Internet data such as . By 2007, the FBI had spent $39 million on its DCSNet system, which collects, stores, indexes, and analyzes communications data. State and federal authorities have had 30,975 wiretap requests authorized since 1968, with only 30 rejections, according to the Electronic Privacy Information Center. Some 1,710 wiretaps were authorized last year, the most ever, with zero denied. Since 1980, authorities also have been able to set secret wiretaps with the approval of the Foreign Intelligence Surveillance Court (FISC), which privacy watchdogs say requires a lower standard of evidence than the general warrant

3 process. For the first two decades, Foreign Intelligence Surveillance Act (FISA) orders numbered less than 1,000 annually; 2003 and 2004 each saw more than 1,700. Only four FISA applications have been rejected, all in In addition, during the first decade of the 21st century, Congress has quietly expanded the authority of the NSA to engage in domestic surveillance. The Protect America Act of 2007 and FISA Amendments Act of 2008 extended the NSA s authority on domestic wiretaps. In order to take advantage of these expanded powers, the NSA established a system called Echelon that intercepted millions of international telephone calls and fed them into the agency s maw for analysis. Justifiably or not, each of these steps unsettled privacy activists. And it is that unease that colors the possible expansion of CALEA to include VoIP and broadband networks, as will be discussed below. Where Are We Today? Federal Government Seeks to Expand the Scope of CALEA It s now no secret that the NSA, the FBI, and the CIA engage in eavesdropping and interception of both foreign originating and domestic originating data and voice communications. The 2001 PATRIOT Act, which essentially expanded CALEA into all communications, was overwhelmingly renewed in With the press coverage of NSA interception activities, and despite intense public pressure, in July 2013 Congress rejected a proposal to prevent the NSA from collecting data on phone calls. However, giant data companies such as Facebook, Google, Yahoo, and Microsoft have recently been exposed by the NSA scandal as cooperating with the NSA and other agencies. This revelation has these megadata collectors eager to tell the extent of their cooperation to their customers, but Attorney General Eric Holder is refusing to allow such transparency to the general public. The Snowden revelations, from Spring and Summer 2013, have exposed that the NSA has a new top secret program called XKeyscore, which essentially makes available everything ever done on the Internet browsing history, searches, content of , online chats, even your metadata all at the tap of a keyboard But it doesn t stop there. A task force comprised of representatives from the US Department of Justice, the FBI, and other agencies have been pressing since January 2011 for amendments to future CALEA requests. CALEA (CALEA II) to make it easier for the government to eavesdrop, intercept, or wiretap a broader variety of communications going over the Internet, not just telephone calls. The Obama administration seeks to expand CALEA coverage to all services that enable communications. This would extend CALEA to cover a broad swath of nontraditional communications companies, particularly those on the Internet for example, and instant messaging providers, social networks, and peer-to-peer communications services like Skype Thus, the revisions being considered for expanding CALEA would greatly expand the types of businesses to which CALEA will apply. Currently, CALEA CALEA systems. applies only to telecommunications carriers, which the law defines as entities: (1) engaged in the transmission or switching of wire or electronic communications, or (2) providing commercial mobile service. 47 U.S.C. 1001(8). Under the substantial replacement arm the DOJ and FCC with significantly stronger enforcement powers. Although a carrier s failure to comply with CALEA is currently punishable by court and FCC fines, 18 U.S.C. 2522(c), In re CALEA and Broadband Access & Services, 21 F.C.C.R. 5360, 5390 (2006), the DOJ has traditionally not pressed the issue against carriers with faulty CALEA systems, preferring to preserve a working relationship in order to facilitate However, recent news reports have surfaced indicating that FBI officials have grown frustrated with CALEA system failures at two major carriers, and that the FBI s technical assistance budget spent to help carriers fix bugs in or retrofit their wiretapping systems is close to $20 million annually. Two specific proposals are circulating within the task force to address these issues: (1) retroactive fines on carriers; and (2) the ability to impose FBI engineering charges upon the carriers. These proposals signal that the DOJ will begin shifting to carriers more costs of technical CALEA compliance, which may force carriers to more proactively manage and update their Michael Sussmann, a former DOJ lawyer who advises communications providers, said that aspect of the plan appeared to be modeled on the British version of CALEA, the Regulation of Investigatory Powers Act of Foreign-based communications services that do business in the United States would be subject to the same procedures, and would be required to have a point of contact on domestic soil who could be served with a wiretap order, provision (SRP), the FCC may also designate as telecommunications carriers companies that provide a service that supplants a substantial portion of local telephone exchange service. Under this SRP authority, the FCC officials said. has designated broadband Internet providers and VoIP providers as telecommunications carriers, finding that they supplanted a user s need for a local telephone exchange service. See In re CALEA and Broadband Access & Services, 20 F.C.C.R (2005); American Council on Educ. v. FCC, 451 F.3d 226 (D.C. Cir. 2006) (upholding FCC s designation of broadband and VoIP providers) The proposed revisions would also this, Mr. Gidari said Albert Gidari Jr., who represents technology companies on law enforcement matters, criticized that proposal. He argued that if the United States started imposing fines on foreign Internet firms, it would encourage other countries, some of which may be looking for political dissidents, to penalize American companies if they refused to turn over users information. We ll look a lot more like China than America after

4 National Security or Mediocre Security With greater ability for the government to eavesdrop or intercept, the less secure the data transmissions are from interception by nongovernment sources. With industrial espionage at an all-time high, it seems incredulous that the FBI wants a more open system for eavesdropping on the Internet, but still believes that it can still secure the US part of the World Wide Web from thirdparty interception. The public tends to forget that with CALEA-compliant equipment being sold overseas as well as domestically, criminals have now expanded their enterprises to include industrial espionage through data interception. There were public scandals about such activities in Greece in 2005 and Italy in In 2012, every phone switch sold to the Department of Defense had security vulnerabilities in its surveillance system. In May 2012, Chinese hackers breached Google s system, revealing Google s protocols for providing surveillance data to the FBI. Obama Administration s Responses to Snowden Revelations/Criticism The Snowden revelations have embarrassed and pushed the Obama administration into a delicate debate between advocates of a strong national security policy and advocates of citizen privacy in accordance with the Fourth Amendment. Indeed, on August 9, 2013, President Obama held a press conference in which he refused to curtail secret surveillance efforts. Nevertheless, he conceded the need for greater openness and safeguards to make the public comfortable with them. The president also stated that he wanted to work with Congress to improve the oversight and auditing of the NSA program so that public confidence was improved in how the data gathered is being used. Moreover, in response to the firestorm over the Snowden/NSA scandal, the Obama administration, in August 2013, also released a 22-page unclassified white paper explaining in greater detail why the government believes that its bulk collection of domestic phone logs and related metadata is lawful. At the same time, the NSA released a seven-page paper outlining its role and authority for its activities. Concurrent with the announcements from the White House, the NSA also indicated, in August 2013, that it is creating a full-time civil liberties and privacy officer position. However, the NSA was silent about the scope of authority for this proposed civil liberties/privacy officer or when such a position would be actually created and funded. Furthermore, the Obama administration announced in August 2013 the creation of a task force that will include outside intelligence specialists and civil liberties advocates to advise the government about how to balance security and privacy as improving computer technology makes it possible to gather an expanding volume about people s private affairs. The task force is formally known as the Review Group on Intelligence and Communications Technology (RGICT). The August 2013 Obama Administration White Paper: Don t Be Alarmed? Since the revelations of massive illegal telephonic interception by the NSA by Edward Snowden, President Obama has at least visually taken several steps to try to assure other governments, as well as the public, that the United States, from here on, will be more transparent concerning interception of telephonic communications. On August 9, 2013, the Obama administration released a white paper concerning its telephone metadata collection program. The paper was supposed to explain the legal basis for the government s collection of information about all Americans phone calls. However, it appears that the release of the August 9th white paper raised more questions than it provided answers. As described earlier in this article, the increase in surveillance, especially by the NSA, was in large part justified by provisions contained in the PATRIOT Act. In addition, it has been revealed that the secretive FISC issues frequent, if not regular, orders to various phone carriers, directing them to send information about every single phone call made in this country time, length, recipient to the NSA on a weekly, if not daily, basis. The white paper sets forth this citation of authority. However, there are several issues that appear not to be discussed and are noticeably missing from the white paper. First, what other electronic data is the government collecting? The paper speaks of phone metadata being collected because the NSA finds such data relevant for filtering out and extrapolating previously unknown associations. However, what other types of personal information is being used and collected? Although medical and library records are not collected in bulk, what about credit card records, which the Wall Street Journal has reported are being gathered by the NSA? If the NSA is not gathering credit card data, who is to say that the IRS is not gathering such credit card data? The government appears to have cryptically denied reports of the NSA gathering such credit card information (because the NSA s mandate is limited to analyzing communications information), but such a prohibition doesn t apply to other agencies. Section 215 of the PATRIOT Act does permit requests for credit card records, and the IRS has reportedly been reviewing bulk credit card databases. It appears that the US government is using section 215 to collect massive amounts of protected telephone data, instead of pen register and trapand-trace orders. These orders allow the government to obtain information about phone calls without recording the content of the calls. Amendments to the PATRIOT Act make it considerably easier to obtain this information, as it relates to foreign intelligence. Regardless, Congress did establish a statutory protocol for intelligence agencies to obtain this type of information. Why did the administration reject it in favor of section 215 of the PATRIOT Act? Third, there seems to be little information about the Executive Branch s interpretation of the term relevance for its gathering of materials under section

5 215 of the PATRIOT Act, as this relates to an investigation concerning counterintelligence or counter-terrorism. There has not been a full delineation or recitation by the IRS on what is the scope and breadth of the term relevant as it applies to gathering of telephonic communications and related data. Furthermore, how is the administration defining an investigation? Under the PATRIOT Act, an order to gather information has to be part of an authorized investigation. However, what constitutes an authorized investigation? In fact, what metadata would be relevant to some aspect of that investigation? The white papers are totally silent on this issue. The Response From ISPs and Social Media Sites ISPs as well as social media services were keenly aware of US government eavesdropping long before the Snowden scandal. The US government, armed with subpoenas and requests under FISA, as well as court orders issued by the secret FISC, has imposed an ever-increasing load of customer data demands on various Internet service providers and social media services such as Twitter, Facebook, Google, and Microsoft. For instance, according to Twitter, Inc. s Transparency Report, the US government led the way among world governments by making 902 user information requests for 1,319 accounts since January The 902 requests made up 70 percent of all requests received by Twitter during that time period. Twitter tallies up the number of requests using information it receives from governments worldwide, usually in response to pending criminal investigations or copyright infringement notices. Nevertheless, the data provided by Twitter seems to parallel other requests issued to Google, Facebook, and Microsoft. For instance, in June 2013, Microsoft and Facebook agreed to a deal that would allow them to disclose FISA requests, but only if they combined those numbers with requests received from local, state, and federal law enforcement agencies and presented the number in a lump sum without breakdowns. Google refused to sign off on the deal, saying it should be allowed to publish FISA requests separately from general law enforcement requests. Google also announced in November 2013 that it was increasing its encryption of traffic flowing between its data centers, as a way to block interception by the US government and NSA. Indeed, this is not the first time Google has been targeted by a government seeking to intercept its communications. Google also suffered a hacking attack by the Chinese government in What is noteworthy is that, as these communications by Google are not considered to be telephone conversations, they would not fall within the mandate of CALEA. Thus, Google can rightfully say to the world that it is doing its best to make its network more secure, not only from Chinese or American government interception, but also from generalized forms of industrial espionage. However, the fact that Google can tighten up its encryption and openly claim to have a more secure network begs the question about US government mandates requiring that cellular or Internet communications be interceptable. Moreover, the extent to which Google can implement this announced policy remains to be seen. As discussed previously, the Obama administration s desire for CALEA II and for a broader reach into Internet communications factors into Google s plans. Proposals for Reforming US Government Eavesdropping In mid-december 2013, recommendations from the Presidential RGICT Task Force had been presented to the White House. Those recommendations were as follows: New constraints on the bulk collection of metadata on phone calls. This is a response to the ongoing, daily transmission of information about the calls an individual makes what phone numbers are involved, how long the call lasts to the NSA. The NSA claims the right to do so under section 215 of the PATRIOT Act, and the secret court that authorizes its spying (FISC) has agreed to it. This provision has increasingly come under fire, both for having walked up to (and maybe over) the line of the Fourth Amendment but also because there s little evidence that it has been effective in stopping terror acts. The proposed change appears to be that phone carriers would be required to maintain those records (which they already do) instead of regularly shipping them to the government. Changes to international surveillance. The ongoing revelations of NSA spying on foreign citizens and, to a greater extent, its surveillance of foreign leaders gave the Obama administration an enormous black eye in the wake of the Snowden leaks. We re not leaving it to Jim Clapper anymore, one official told the Times about foreign surveillance judgment calls, given how infrequently the agency has been challenged to weigh the intelligence benefits of its foreign collection operations against the damage that could be done if the programs were exposed. Introducing opposing lawyers at FISC hearings. Right now, the FISC hears only from one set of lawyers the government s when considering whether or not something should be allowed. The court insists that it applies pressure, but privacy advocates have called for including an opposing point of view. It appears that the panel will recommend doing so. Make the head of the NSA a civilian position. This proposal would move the military s Internet warfare division, the Cyber Command, out of the NSA, allowing the spy agency to be run by a civilian.

6 Separating the codemakers from codebreakers. One of the more alarming Snowden revelations was that the NSA was, on one hand, working to strengthen online security (to block hackers), while on the other hand working to undermine online encryption algorithms (to catch terrorists). One proposal would move the agency s encryption team away from the people working to undermine those tools. If all of these proposals were to be implemented, there s little question that the effect would be sweeping. However, the NSA and its advocates like Director of National Intelligence James Clapper will offer fierce resistance, and it s not clear how the president himself will respond. The Washington Post notes that the proposals, particularly the one about reforming phone records, will bolster ongoing congressional attempts to curtail the spying, but any such measures would also need to be signed into law by President Obama. A Federal Judge Declares the NSA Eavesdropping/Surveillance Program Unconstitutional Just as the Obama administration was navigating the NSA surveillance program debate with issuing a report of possible reforms, a federal judge in Washington, DC, on almost the same day in December 2013, ruled the NSA mass phone surveillance program as likely unconstitutional. See Klayman v. Obama, Memorandum Opinion, Docket Entry #48, Case # (D.D.C. December 16, 2013). In an issuing a restraining order in excess of 50 pages, US District Court Judge Richard Leon declared the NSA s bulk collection of metadata phone records of the time and numbers called without any disclosure of content apparently violates the Fourth Amendment s protections of citizen privacy. I cannot imagine a more indiscriminate and arbitrary invasion than this systematic and high-tech collection and retention of personal data on The progress of science in furnishing the Government with means of espionage is not likely to stop with wire-tapping. Ways may someday be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home.... Can it be that the Constitution affords no protection against such invasions of individ virtually every citizen for purposes of querying and analyzing it without prior judicial approval, said Leon, an appointee of President George W. Bush. Surely, such a program infringes on that degree of privacy that the cellular networks. Founders enshrined in the Fourth Amendment It s no secret that the NSA, the FBI, and the CIA engage in eavesdropping and interception be thinking about of both foreign originating and domestic originating data and voice communications Despite issuing the injunction, Judge Leon has stayed enforcement of the injunction, while the parties appeal the decision, which likely will end up in the US Supreme Court Conclusion In closing, one needs to recognize that cellular telephone companies talk about having the fastest network or the network with the broadest coverage. These cellular companies never talk about having the most secure network or the most heavily encrypted network. To do so would put the cellular companies in direct violation of CALEA. However, it is more than a debate between national security and citizen privacy. Although CALEA imposes that telecommunication providers developing encryption standards set a lower bar for interception, these same cellular/internet networks are then open to interception or attack by foreign governments as well as by foreign corporations seeking to gain a competitive advantage in the world marketplace. Indeed, the global economy now obviously consists of law firms, health ual security? u care companies, insurance companies, and large marketing concerns that are gathering huge amounts of data and transmitting that data over cellular networks or discussing such data over If those networks are intentionally designed to be able to be intercepted by the US government, the Canadian government, or the other governments pursuant to various forms of a government-imposed communications assistance statute, those networks are not as secure as they could be, and thus are open to industrial cyberattack espionage. These are matters that every citizen, not just every attorney, needs to The actions and statements of the Obama administration, and the highly anticipated resolution of the Klayman case over whether the NSA data gathering program is constitutional, create a plethora of questions and few answers. However, this entire debate once again brings home the 1928 prophecy of Justice Brandeis in his dissent in the Olmstead wiretapping decision: Subtler and more far-reaching means of invading privacy have become available to the Government. Discovery and invention have made it possible for the Government, by means far more effective than stretching upon the rack, to obtain disclosure in court of what is whispered in the closet.

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA --------------------------------------------------- KLAYMAN et al., Plaintiffs,

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

Computer Science 199r. CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony

Computer Science 199r. CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony Computer Science 199r CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony Pierce Tria May 14, 2007 Privacy Concerns with Next Generation Telephony I. CALEA and The USA

More information

Digital Surveillance: The Communications Assistance for Law Enforcement Act

Digital Surveillance: The Communications Assistance for Law Enforcement Act Order Code RL30677 Digital Surveillance: The Communications Assistance for Law Enforcement Act Updated June 8, 2007 Patricia Moloney Figliola Specialist in Telecommunications and Internet Policy Resources,

More information

VoIP Service Provider Regulatory Compliance Guide:

VoIP Service Provider Regulatory Compliance Guide: VoIP Service Provider Regulatory Compliance Guide: Your Comprehensive Guide for Ensuring Compliance with Federal Communications Commission (FCC) and State Regulations Applicable to Interconnected VoIP

More information

Privacy Year in Review: Privacy and VoIP Technology

Privacy Year in Review: Privacy and VoIP Technology Privacy Year in Review: Privacy and VoIP Technology JOHN B. MORRIS, JR. ABSTRACT Voice over internet protocol ( VoIP ) technology is increasingly being used throughout the nation. VoIP technology provides

More information

The Ethical Implications of NSA Surveillance for Lawyers. David G. Ries Clark Hill Thorp Reed

The Ethical Implications of NSA Surveillance for Lawyers. David G. Ries Clark Hill Thorp Reed The Ethical Implications of NSA Surveillance for Lawyers David G. Ries Clark Hill Thorp Reed 2 3 The June 2013 Headlines: NSA collecting phone records of millions of Verizon customers daily The Guardian,

More information

OPEN ACCESS, PRIVACY AND HACKER CULTURE

OPEN ACCESS, PRIVACY AND HACKER CULTURE OPEN ACCESS, PRIVACY AND HACKER CULTURE An Inside Higher Ed webinar with Tracy Mitrano Director of IT policy and the Institute for Internet Culture Policy and Law at Cornell University October 2, 2013

More information

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office Voice over Internet Protocol Kristie Prinz The Prinz Law Office I. What is Voice over Internet Protocol ( VoIP )? Voice over Internet Protocol ( VoIP ) is a technology, which facilitates the transmission

More information

Politics and Cryptography in the United States. Outline. What are Your Rights? Syvale Lee April 11, 2006

Politics and Cryptography in the United States. Outline. What are Your Rights? Syvale Lee April 11, 2006 Politics and Cryptography in the United States Syvale Lee April 11, 2006 Outline Bill of Rights Security versus Freedom Current Trends in Computer Security Export Control on Cryptography Pretty Good Privacy

More information

Thank you for the opportunity to join you here today.

Thank you for the opportunity to join you here today. Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.

More information

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information

Before the Federal Communications Commission Washington, D.C. 20554

Before the Federal Communications Commission Washington, D.C. 20554 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Inquiry Concerning High Speed Access to ) GN Docket No. 00-185 the Internet Over Cable and Other Facilities ) Proprietary

More information

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3) DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners

More information

FCC Adopts Controversial Net Neutrality Rules Governing Broadband Internet Access Services

FCC Adopts Controversial Net Neutrality Rules Governing Broadband Internet Access Services January 2011 FCC Adopts Controversial Net Neutrality Rules Governing Broadband Internet Access Services BY CARL W. NORTHROP, MICHAEL LAZARUS & DAVID DARWIN The Federal Communications Commission (the FCC

More information

The threats which were perceivable 20 years ago differ greatly from our ever increasing

The threats which were perceivable 20 years ago differ greatly from our ever increasing 1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different

More information

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Preservation of longstanding, roles and missions of civilian and intelligence agencies Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto

More information

Privacy and Civil Liber0es Oversight Board

Privacy and Civil Liber0es Oversight Board Privacy and Civil Liber0es Oversight Board Report on the Surveillance Program Operated Pursuant to Sec7on 702 of the Foreign Intelligence Surveillance Act JULY 2, 2014 PRI V ACY AND CI VIL LI BE RTIES

More information

UNITED STATES DISTRICT COURT DISTRICT OF OREGON PORTLAND DIVISION

UNITED STATES DISTRICT COURT DISTRICT OF OREGON PORTLAND DIVISION UNITED STATES DISTRICT COURT DISTRICT OF OREGON PORTLAND DIVISION UNITED STATES OF AMERICA, Plaintiff, v. Criminal Case No. 3:10-CR-00475-KI-1 OPINION AND ORDER MOHAMED OSMAN MOHAMUD, Defendant. S. Amanda

More information

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Kurt Wimmer I. The Need for Reform: A 1986 Act Doesn t Fit the

More information

SUNDAY, JUNE 16, 2013. MARINA Internet metadata

SUNDAY, JUNE 16, 2013. MARINA Internet metadata ABCDE SUNDAY, JUNE 16, 2013 NSA SURVEILLANCE The Architecture Four-pronged U.S. approach relies heavily on data behind Internet, phone communications By Barton Gellman On March 12, 2004, acting attorney

More information

Report on the Telephone Records Program. Conducted under Section 215. of the USA PATRIOT Act and on the

Report on the Telephone Records Program. Conducted under Section 215. of the USA PATRIOT Act and on the PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court

More information

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information

U.S. Department of Justice. Federal Bureau of Investigation VIA ELECTRONIC SUBMISSION

U.S. Department of Justice. Federal Bureau of Investigation VIA ELECTRONIC SUBMISSION U.S. Department of Justice Federal Bureau of Investigation Electronic Surveillance Technology Section 14800 Conference Center Drive, Suite 300 Chantilly, VA 20151 July 11, 2003 VIA ELECTRONIC SUBMISSION

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,

More information

Before the FEDERAL COMMUNICATIONS COMMISSION. Washington, DC 20006

Before the FEDERAL COMMUNICATIONS COMMISSION. Washington, DC 20006 Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of ) ) Joint Petition for Rulemaking to Resolve ) RM-10865 Various Outstanding Issues Concerning the ) Implementation of

More information

Case 1:13-cv-00851-RJL Document 146 Filed 09/15/15 Page 1 of 9 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) ) ) ) ) ) ) ) ) )

Case 1:13-cv-00851-RJL Document 146 Filed 09/15/15 Page 1 of 9 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) ) ) ) ) ) ) ) ) ) Case 1:13-cv-00851-RJL Document 146 Filed 09/15/15 Page 1 of 9 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA LARRY KLAYMAN, et al., v. Plaintiffs, BARACK OBAMA, President of the United

More information

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,

More information

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the

More information

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Steven M. Bellovin https://www.cs.columbia.edu/ smb Join work with Matt Blaze, Sandy Clark, Susan Landau Steven M. Bellovin

More information

As the US debates email privacy a Berlin start up surges with...

As the US debates email privacy a Berlin start up surges with... TOP STORIES / SCI-TECH DATA PROTECTION As the US debates email privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

(202) 418-2468. FCC ADOPTS ORDER TO ENABLE LAW ENFORCEMENT TO ACCESS CERTAIN BROADBAND AND VoIP PROVIDERS

(202) 418-2468. FCC ADOPTS ORDER TO ENABLE LAW ENFORCEMENT TO ACCESS CERTAIN BROADBAND AND VoIP PROVIDERS NEWS Federal Communications Commission 445 12 th Street, S.W. Washington, D. C. 20554 News Media Information 202 / 418-0500 Internet: http://www.fcc.gov TTY: 1-888-835-5322 This is an unofficial announcement

More information

Barbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut)

Barbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut) Date submitted: 14/08/2009 Librarians Shushed No More: The USA PATRIOT Act, The Connecticut Four, and Professional Ethics Barbara M. Jones, Ph.D. International Library Consultant, USA Former University

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have

More information

A Critique of President Obama s Reforms of U.S. Intelligence

A Critique of President Obama s Reforms of U.S. Intelligence CENTER FOR SECURITY POLICY OCCASIONAL PAPER SERIES A Center for Security Policy Analysis Fred Fleitz and Clare Lopes 1/27/2014 Fred Fleitz served in U.S. national security positions for 25 years at the

More information

Regulatory Reclassification of Broadband Internet Access Service is the Unsurprising Result of ISPs Inexplicable Challenges to FCC Authority

Regulatory Reclassification of Broadband Internet Access Service is the Unsurprising Result of ISPs Inexplicable Challenges to FCC Authority Regulatory Reclassification of Broadband Internet Access Service is the Unsurprising Result of ISPs Inexplicable Challenges to FCC Authority An Open Internet has long been a bipartisan goal in the United

More information

Privacy in the cloud. DNB has indicated that it considers cloud computing a form of outsourcing.

Privacy in the cloud. DNB has indicated that it considers cloud computing a form of outsourcing. Privacy in the cloud computing, and the company concerned is required to submit a risk analysis to DNB. 3 Cloud computing entails the saving, processing and using of company data on the servers of a cloud

More information

The Year 2013 Has Become 1984

The Year 2013 Has Become 1984 The Year 2013 Has Become 1984 Saturday, September 21, 2013 23:33 idiscovery Solutions Tom Matzen The Editor interviews Tom Matzen, Director at idiscovery Solutions, in charge of the firm s International

More information

TO BE PUBLISHED IN THE OFFICIAL REPORTS. OFFICE OF THE ATTORNEY GENERAL State of California. DANIEL E. LUNGREN Attorney General

TO BE PUBLISHED IN THE OFFICIAL REPORTS. OFFICE OF THE ATTORNEY GENERAL State of California. DANIEL E. LUNGREN Attorney General 1 of 5 TO BE PUBLISHED IN THE OFFICIAL REPORTS OFFICE OF THE ATTORNEY GENERAL State of California DANIEL E. LUNGREN Attorney General OPINION : : No. 97-703 of : : December 5, 1997 DANIEL E. LUNGREN : Attorney

More information

Recent Developments in Cybersurveillance

Recent Developments in Cybersurveillance David W. Opderbeck New Jersey Law Journal, May 16, 2016 Over the past few months, there has been a flurry of sometimes contradictory activity concerning the government's ability to access electronic information

More information

CFIUS and Network Security Agreements 1

CFIUS and Network Security Agreements 1 CFIUS and Network Security Agreements 1 Mark E. Plotkin 2 David M. Marchick 3 David N. Fagan 4 This memorandum provides an overview of the principal U.S. government national security considerations and

More information

CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR

CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR July 28, 2015 The Senate is expected to consider the Cybersecurity Information Sharing Act (CISA, S. 754 1 ) on the Senate floor soon. The bill was marked

More information

Email Data Security. The dominant business communication tool

Email Data Security. The dominant business communication tool Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools

More information

Managing the Muddled Mass of Big Data

Managing the Muddled Mass of Big Data Managing the Muddled Mass of Big Data By Susan Freiwald University of San Francisco School of Law At the same time that Big Data promises previously unobtainable insights, its use places significant pressure

More information

Managing the Muddled Mass of Big Data

Managing the Muddled Mass of Big Data Managing the Muddled Mass of Big Data By Susan Freiwald University of San Francisco School of Law At the same time that Big Data promises previously unobtainable insights, its use places significant pressure

More information

Just Net Coalition statement on Internet governance

Just Net Coalition statement on Internet governance Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a

More information

details, and numerous other data points. Enough information is often collected that even 2

details, and numerous other data points. Enough information is often collected that even 2 Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 650 Pennsylvania Avenue, NW Washington, D.C. 050 VIA E MAIL bigdata@ostp.gov March, 04 Re: Big Data Study, Document

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)

More information

Presentation by ACRI Attorney Sharon Abraham-Weiss to the ICJ Eminent Jurists Panel on Terrorism, Counter-Terrorism, and Human Rights

Presentation by ACRI Attorney Sharon Abraham-Weiss to the ICJ Eminent Jurists Panel on Terrorism, Counter-Terrorism, and Human Rights August 2007 Presentation by ACRI Attorney Sharon Abraham-Weiss to the ICJ Eminent Jurists Panel on Terrorism, Counter-Terrorism, and Human Rights The Law of Citizenship and Entry into Israel (Temporary

More information

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR

More information

FEB 0 S 2012. The Honorable John Boehner Speaker United States House ofrepresentatives Washington, D.C. 20515

FEB 0 S 2012. The Honorable John Boehner Speaker United States House ofrepresentatives Washington, D.C. 20515 The Honorable John Boehner Speaker United States House ofrepresentatives Washington, D.C. 20515 FEB 0 S 2012. The Honorable Harry Reid Majority Leader United States Senate Washington, D.C. 20510 The Honorable

More information

Freedom of Information Act Request and Request for Expedited Processing

Freedom of Information Act Request and Request for Expedited Processing February 24, 2014 Arnetta Mallory - FOIA Initiatives Coordinator National Security Division U.S. Department of Justice 950 Pennsylvania Avenue, N.W. Room 6150 Washington, DC 20530-0001 BY EMAIL nsdfoia@usdoj.gov

More information

Pursuant to section 1.7(i) of Executive Order 12333, as amended, the FBI is authorized to:

Pursuant to section 1.7(i) of Executive Order 12333, as amended, the FBI is authorized to: PRESIDENTIAL POLICY DIRECTIVE 28 POLICIES AND PROCEDURES I. Introduction Presidential Policy Directive 28 regarding signals intelligence activities (hereinafter PPD-28 ), issued January 17, 2014, articulates

More information

Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology

Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology Cell-site simulator technology provides valuable assistance in support of important public safety objectives. Whether deployed

More information

The Whistleblower Stampede And The. New FCA Litigation Paradigm. Richard L. Shackelford. King & Spalding LLP

The Whistleblower Stampede And The. New FCA Litigation Paradigm. Richard L. Shackelford. King & Spalding LLP The Whistleblower Stampede And The New FCA Litigation Paradigm Richard L. Shackelford King & Spalding LLP Actions under the qui tam provisions of the False Claims Act ( FCA ), 31 U.S.C. 3730(b)-(h), are

More information

Information Security Law: Control of Digital Assets.

Information Security Law: Control of Digital Assets. Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security

More information

Global Information Society Watch 2014

Global Information Society Watch 2014 Global Information Society Watch 2014 Communications surveillance in the digital age This report was originally published as part of a larger compilation, which can be downloaded from GISWatch.org Association

More information

Bush Lets U.S. Spy on Callers Without Courts

Bush Lets U.S. Spy on Callers Without Courts Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

WHITE PAPER. Gaining Total Visibility for Lawful Interception

WHITE PAPER. Gaining Total Visibility for Lawful Interception WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...

More information

October 19, 2015 POLICY DIRECTIVE 047-02. Assistant Secretary U.S. Immigration and Customs Enforcement

October 19, 2015 POLICY DIRECTIVE 047-02. Assistant Secretary U.S. Immigration and Customs Enforcement October 19, 2015 Deputy Secretary U.S. Department of Homeland Security Washington, DC 20528 Homeland Security POLICY DIRECTIVE 047-02 MEMORANDUM FOR: Sarah Saldana Assistant Secretary U.S. Immigration

More information

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance Valerie J.M. Watzlaf, PhD, RHIA, FAHIMA, Sohrab Moeini, MS, and Patti Firouzan, MS, RHIA Department of Health Information

More information

CSA Survey Results Government Access to Information July 2013

CSA Survey Results Government Access to Information July 2013 CSA Survey Results Government Access to Information July 2013 EXECUTIVE OVERVIEW During June and July of 2013, news of a whistleblower, US government contractor Edward Snowden, dominated global headlines.

More information

DOES OHIO S HEALTH CARE FREEDOM AMENDMENT PROHIBIT IT FROM ENACTING AN OBAMACARE EXCHANGE?

DOES OHIO S HEALTH CARE FREEDOM AMENDMENT PROHIBIT IT FROM ENACTING AN OBAMACARE EXCHANGE? DOES OHIO S HEALTH CARE FREEDOM AMENDMENT PROHIBIT IT FROM ENACTING AN OBAMACARE EXCHANGE? Maurice A. Thompson March 26, 2012 Introduction: Ohio Cannot and Must not Implement an Exchange. On March 22,

More information

Before the Federal Communications Commission

Before the Federal Communications Commission Before the Federal Communications Commission In the Matter of ) ) ET Docket No. 04-295 Communications Assistance for Law ) Enforcement Act and Broadband Access ) and Services ) ) Pursuant to the Commission's

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

In the Matter of ) ) ) ) Consumer Information and Disclosure ) CG Docket No. 09-158. Truth-in-Billing and Billing Format ) CG Docket No.

In the Matter of ) ) ) ) Consumer Information and Disclosure ) CG Docket No. 09-158. Truth-in-Billing and Billing Format ) CG Docket No. Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of Empowering Consumers to Prevent and Detect Billing for Unauthorized Charges ( Cramming CG Docket No. 11-116 Consumer Information

More information

Federation of Law Societies of Canada. Ottawa, November 26, 2013

Federation of Law Societies of Canada. Ottawa, November 26, 2013 Submission to the Standing Senate Committee on Banking, Trade and Commerce in Respect of Bill C-4 (a second Act to implement certain provisions of the budget tabled in Parliament on March 21, 2013 and

More information

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development 7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing

More information

Principles in Collision: Labor Union rights v. Employee civil Rights

Principles in Collision: Labor Union rights v. Employee civil Rights Principles in Collision: Labor Union rights v. Employee civil Rights Barry Winograd Arbitrator and mediator in Oakland, California Member of the National Academy of Arbitrators Adjunct faculty of the law

More information

JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE

JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE

More information

How To Get A Law Passed In The United States

How To Get A Law Passed In The United States HARVARD MODEL CONGRESS SAN FRANCISCO 2015 BRIEFING SUMMARIES A Memo for Members of the Presidential Cabinet RECENT UPDATES CIA - Cyber Hacking The CIA is concerned about cyberhacking because it has the

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1 US Intelligence Community 2005-6 Thomas Patrick Carroll 1 Policy (defn): (a) General course of action, selected from among alternatives, intended to guide present and future decisions. (b) A highlevel

More information

WHISTLEBLOWER PROTECTION Additional Actions Needed to Improve DOJ's Handling of FBI Retaliation Complaints

WHISTLEBLOWER PROTECTION Additional Actions Needed to Improve DOJ's Handling of FBI Retaliation Complaints United States Government Accountability Office Testimony Before the Committee on the Judiciary, U.S. Senate For Release on Delivery Expected at 10:00 a.m. ET Wednesday, March 4, 2015 WHISTLEBLOWER PROTECTION

More information

Federal Criminal Court

Federal Criminal Court No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled

More information

Statement for the Record of The Electronic Privacy Information Center (EPIC)

Statement for the Record of The Electronic Privacy Information Center (EPIC) Statement for the Record of The Electronic Privacy Information Center (EPIC) Marc Rotenberg, EPIC President Ginger McCall, Director, EPIC Open Government Project Hearing on "DHS Monitoring of Social Networking

More information

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with

More information

How to get from laws to technical requirements

How to get from laws to technical requirements How to get from laws to technical requirements And how the OPM hack relates technology, policy, and law June 30, 2015 Isaac Potoczny-Jones ijones@galois.com www.galois.com Galois, Inc. Overview Outline!

More information

Patriot Act Impact on Canadian Organizations Using Cloud Services

Patriot Act Impact on Canadian Organizations Using Cloud Services Patriot Act Impact on Canadian Organizations Using Cloud Services November 8, 2013 By Scott Wright The Streetwise Security Coach http://www.securityperspectives.com 1 PRESENTATION TITLE Why do nation-states

More information

STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION

STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION STATEMENT OF MICHAEL HINTZE ASSOCIATE GENERAL COUNSEL MICROSOFT CORPORATION BEFORE THE SUBCOMMITTEE ON THE CONSTITUTION, CIVIL RIGHTS, AND CIVIL LIBERTIES UNITED STATES HOUSE OF REPRESENTATIVES HEARING

More information

18. Encryption and Wiretapping

18. Encryption and Wiretapping 18. Encryption and Wiretapping Congress should lift all technical review requirements for encryption software and hardware; reject attempts to foist key escrow, or key recovery, on the market; reject a

More information

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire Working paper GTJMCE-2015-1 This working paper along with others in the same series can be found online at:

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan:

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan: John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505 November 4, 2015 Mr. Brennan: On March 31, 2015 several organizations called on the Central Intelligence Agency

More information

INTELLECTUAL PROPERTY UPDATE

INTELLECTUAL PROPERTY UPDATE INTELLECTUAL PROPERTY UPDATE May 2007 1 Hogan & Hartson LLP INTELLECTUAL PROPERTY UPDATE Supreme Court Holds That 35 U.S.C. 271(f) Does Not Apply To Golden Master Disks In a decision handed down April

More information

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!

More information

Counterterrorism and Humanitarian Engagement Project

Counterterrorism and Humanitarian Engagement Project Counterterrorism and Humanitarian Engagement Project OFAC Licensing Background Briefing March 2013 I. Introduction 1 The U.S. Department of Treasury s Office of Foreign Assets Control (OFAC) administers

More information

HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act

HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret Maine law. For legal assistance, please contact a qualified attorney. Be it enacted by the People of the

More information

Introduction to HIPAA Privacy

Introduction to HIPAA Privacy Introduction to HIPAA Privacy is published by HCPro, Inc. Copyright 2003 HCPro, Inc. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced, in any

More information