Recent Developments in Cybersurveillance
|
|
|
- Fay Floyd
- 9 years ago
- Views:
Transcription
1 David W. Opderbeck New Jersey Law Journal, May 16, 2016 Over the past few months, there has been a flurry of sometimes contradictory activity concerning the government's ability to access electronic information in the course of a criminal investigation. This article highlights three recent proposals that show how the broader policy debate is playing out at the level of specific legal rules. Changes to the Federal Rules of Criminal Procedure Concerning Search Warrants On April 28, the Supreme Court adopted changes to F. R. Crim. Pro. 41, adding a subsection (6), to authorize a magistrate judge in any district "where activities related to a crime may have occurred" to issue a warrant "to use remote access to search electronic storage media and to seize or copy electronically stored information located within or outside that district." Under the amendment, such warrants can issue if "the district where the media or information is located has been concealed through technological means" or in cases involving investigations of hacking or malware transmission under the Computer Fraud and Abuse Act where the "media" are damaged computers in five or more districts. Historically, warrants were only available for search and seizure within the district where the warrant was issued. In 1990, F. R. Crim. Pro. 41 was amended to permit a warrant for search and seizure of a person or property located outside the district "if the person or property is located within the district when the warrant is issued but might move or be moved outside the district before the warrant is executed." Fed. R. Crim. P. 41(b)(1)-(2). This principle was expanded by the PATRIOT Act in 2002 to include authority to issue a warrant for a person or property outside the district if the investigation involved domestic or international terrorism, and was further amended in 2006 to include warrants for installation of a tracking device to track the movement of person inside or outside the district. SeeFed. R. Crim. P. 41(b)(1)-(4). Finally, in 2006 the rule was amended to clarify that a warrant could be issued for property outside the district but within a U.S. territory, possession or commonwealth, on the premises of a U.S. diplomatic or consular mission in a foreign state, or in a residence leased by the U.S. and used by U.S. personnel assigned to a U.S. diplomatic or consular mission in a foreign state. Fed. R. Crim. P. 41(5). Reprinted with permission from the May 16, 2016 issue of The New Jersey Law Journal ALM Media Properties, LLC. Further duplication without permission is prohibited. All rights reserved.for information, contact or [email protected] or visit
2 Critics of the recent addition of subsection (6), including some tech industry giants such as Google, argued that "remote access" warrants will provide authority for nationwide or even worldwide electronic surveillance. Google's comments in this regard were typical of tech industry concerns: The proposed change does not define what a "remote search" is or under what circumstances and conditions a remote search can be undertaken; it merely assumes such searches, whatever they may be, are constitutional and otherwise legal. It carries with it the specter of government hacking without any Congressional debate or democratic policy-making process. Notwithstanding such objections, the rule change was approved by the Supreme Court, and will become effective unless disavowed by Congress before Dec. 1, under the Rules Enabling Act. See 28 U.S.C Burr-Feinstein Bill On April 13, Senators Richard Burr (R-N.C.) and Diane Feinstein (D-Calif.), Chair and Vice- Chair, respectively, of the Senate Intelligence Committee, released a draft bill titled the "Compliance With Court Orders Act of 2016." This bill responds to the recent showdowns between Apple and the FBI concerning the ability to compel technology companies under the All Writs Act to assist with access to locked and encrypted devices such as iphones. See David W. Opderbeck, "The Apple iphone Showdown: What Is at Stake," N.J.L.J., March 7, The bill would require any covered entities that receive court orders "for information or data" to provide the information or data "in an intelligible format" and to "provide such technical assistance as is necessary to obtain such information or data in an intelligible format or to achieve the purpose of the court order." Discussion Draft, Sec. 3(a)(1). The bill states that a covered entity is only responsible for providing data in an intelligible format "if such data has been made unintelligible by a feature, product, or service owned, controlled, created, or provided, by the covered entity or a by a third party on behalf of the covered entity." Id., Sec. 3(a)(2). The bill further states that it would not authorize any government officer to require or prohibit "any specific design or operating system to be adopted." Id., Sec. 3(b). However, the very next subsection of the bill requires providers of "remote computing service" or "electronic communication service" to ensure that their products or services are capable of complying with - 2 -
3 the requirement to provide data in an intelligible format. Id., Sec. 3(d), (e). The terms "remote computing service" and "electronic communication services" are defined to have the meanings provided in the Electronic Communication Privacy Act (ECPA), 18 U.S.C. s 2510, The draft bill was immediately pilloried by technology-industry and civil-liberties advocates. For example, Kevin Bankston, director of the New America Foundation's Open Technology Institute, called it "easily the most ludicrous, dangerous, technically illiterate proposal I've ever seen." Andy Greenberg, "The Senate's Draft Encryption Bill is Ludicrous, Dangerous, Technically Illiterate," Wired Security, April 8, Critics noted that the bill's performance standard necessarily would constrain design choices, that it would effectively outlaw user-directed end-toend encryption, and that it would require a greater level of technological assistance than the government ever sought in the All Writs Act cases. See"The Burr-Feinstein Proposal is Simply Anti-Security," Electronic Frontier Foundation Deeplinks Blog, April 8, Proposed Amendments to ECPA The changes to F. R. Crim. P. 41 and the Burr-Feinstein Bill are pro-law-enforcement and antiencryption. Not all recent legislative proposals, however, fall on that side of the line. On April 27, the " Privacy Act" passed the House of Representatives. See H.R. 699, 114th Cong. 2d Sess. ( ). The Privacy Act would amend the ECPA to require the government to obtain a search warrant to access stored electronic communications. Current law makes a distinction between electronic communications in transit and in storage. For communications in transit, the Wiretap Act requires a showing of probable cause plus a showing that "normal investigative procedures have been tried and have failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous." 18 U.S.C. s 2518(3). Wiretap orders must expire after 30 days, although extensions are possible upon a showing of necessity. Id. s. 2518(5). For communications in storage, presently, the ECPA distinguishes between contents stored by an "electronic communication service (ECS)" and a "remote computing service (RCS)," and as to an ECS, further distinguishes whether the communications have been in storage for 180 days or more. See18 U.S.C Finally, the ECPA allows a judge in any district, not only the district where the information is stored, to issue the order. Id. s. 2703(d)
4 Under the current ECPA, the contents of stored electronic communications (such as s and voic s) that have been in storage by an ECS for 180 days or less can be obtained only through a warrant. 18 U.S.C. s 2703(a). However, the government may obtain the contents of information held by an RCS "solely for the purpose of providing storage or computer processing services," or held in storage by an ECS for 180 days or more, through a court order based on "specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation." 18 U.S.C. s. 2703(a)-(d). In other words, the law currently recognizes a lower expectation of privacy: (a) for the contents of communications held in storage by an RCS; and (b) for the contents of s and other communications held in storage for more than 180 days by an ECS. These distinctions date back to the early days of the Internet, when users were able to download and store only a small amount of data from servers run by their service providers. See H. Rept th Congress ( ) April 26, 2016, As Reported by the Judiciary Committee. The Privacy Act would instead recognize the same expectation of privacy in all communications stored by third-party providers by requiring a warrant on probable cause before the government could obtain the contents of such communications, regardless of how long they have been in storage, and regardless of whether the provider is classified as an RCS or ECS. See Privacy Act, Sec. 3. This would make the statute consistent with practice in the Sixth Circuit, which has held the distinctions under the present ECPA unconstitutional under the Fourth Amendment. See United States v. Warshak, 631 F.3d 266 (6th Cir. 2010). The bill would not affect the government's ability to obtain noncontent information, such as subscriber records, through an administrative subpoena, nor would it change the ability of the owner of a communication system, such as an employer-owned system, to disclose stored information voluntarily. Conclusion These three recent proposals get "into the weeds" of the larger national policy debate about encryption and Internet surveillance. They demonstrate that the larger debate implicates a host of more granular authorities involving the scope and requirements of judicially approved process for the government to obtain electronic information and for technology companies to assist with such a process. The critics may be right to worry about the jurisdictional and technological breadth of the changes to the search warrant rule and in the Burr-Feinstein Bill. However, even - 4 -
5 if these rules are not adopted and the pro-privacy changes of the Privacy Act are enacted into law, significant issues will remain concerning how law enforcement can execute its mission to provide security for everyone while respecting Constitutional privacy concerns in the Internet age. The history of both Federal Rule of Criminal Procedure 41 and the ECPA show that the law in this area is constantly changing in response to new challenges and threats
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed
BILL ANALYSIS Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT Internet communications companies often hold information
SENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen
SENATE.............. No. 2299 The Commonwealth of Massachusetts In the Year Two Thousand Fourteen SENATE, Wednesday, July 23, 2014 The committee on Ways and Means, to whom was referred the Senate Bill
Future Proof Your ediscovery Practices
FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting
Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States
Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States Cloud computing is one of the Internet s great innovations, enabling individuals
Be it enacted by the People of the State of Illinois,
AN ACT concerning location surveillance. Be it enacted by the People of the State of Illinois, represented in the General Assembly: Section 1. Short title. This Act may be cited as the Freedom From Location
S. 607. [Report No. 113 lll] To improve the provisions relating to the privacy of electronic communications. IN THE SENATE OF THE UNITED STATES
II TH CONGRESS ST SESSION S. 0 Calendar No. ll [Report No. lll] To improve the provisions relating to the privacy of electronic communications. IN THE SENATE OF THE UNITED STATES MARCH, Mr. LEAHY (for
PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT. CORA D. TUCKER, Plaintiff-Appellant,
PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT CORA D. TUCKER, Plaintiff-Appellant, v. D. W. WADDELL, both individually and in his official capacity as a police officer for the City of
Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.
Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for
UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Criminal No. 13-107(DSD/FLN) This matter is before the court upon the objection by
United States of America, UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Criminal No. 13-107(DSD/FLN) Plaintiff, v. ORDER Michael Duane Hoffman, This matter is before the court upon the objection by
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION IN THE MATTER OF APPLICATION FOR CELL TOWER RECORDS MAGISTRATE NO. H-15-136M UNDER 18 U.S.C. 2703(D) OPINION On February 10, 2015
TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT
TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT Don t get lost in the cloud! This session will arm you with an understanding of the intricacies of
THE USA PATRIOT ACT: IMPLICATIONS FOR LAWFUL INTERCEPTION. White Paper
THE USA PATRIOT ACT: IMPLICATIONS FOR LAWFUL INTERCEPTION White Paper Presented Jointly by Intelligence and Information Systems May, 2006 Aqsacom Document No. AQSA050579 Copyright 2006 Aqsacom Inc. and
Pan-American Governmental Access to Data in the Cloud
A Hogan Lovells White Paper Pan-American Governmental Access to Data in the Cloud A comparative analysis of seven Latin American jurisdictions to the United States by Christopher Wolf, Washington, DC Bret
HOUSE ENROLLED ACT No. 1009
Second Regular Session 118th General Assembly (2014) PRINTING CODE. Amendments: Whenever an existing statute (or a section of the Indiana Constitution) is being amended, the text of the existing provision
ADMINISTRATIVE ASSESSMENT OF CIVIL PENALTIES AGAINST FEDERAL AGENCIES UNDER THE CLEAN AIR ACT
ADMINISTRATIVE ASSESSMENT OF CIVIL PENALTIES AGAINST FEDERAL AGENCIES UNDER THE CLEAN AIR ACT The Clean Air Act authorizes the Environmental Protection Agency administratively to assess civil penalties
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)
CYBERCRIME LAWS OF THE UNITED STATES
CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications
Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor
Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,
HB659 151295-1. By Representative Hall. RFD: Judiciary. First Read: 23-APR-13. Page 0
HB -1 By Representative Hall RFD: Judiciary First Read: -APR-1 Page 0 -1:n:0/0/01:JET/mfc LRS01-1 1 1 1 1 1 1 1 1 0 1 SYNOPSIS: Under existing law, a court or magistrate may issue a warrant for the search
F ACEBOOK ACCOUNT SEARCH WARRNT AFFIDAVIT. at http://1 0.173.2.l2/criminal/ccips/online/library.htm under "Guides from ISPs."
F ACEBOOK ACCOUNT SEARCH WARRNT AFFIDAVIT ~tly\ ~"\,+i"". '-u..d"o~ USAGE NOTES: This go-by is for obtaining information relating to social networking accounts maintained on Facebook. The Facebook law
Public Law 96-226 96th Congress An Act
PUBLIC LAW 96-226 APR. 3, 1980 94 STAT. 311 Public Law 96-226 96th Congress An Act To improve budget management and expenditure control by revising certain provisions relating to the Comptroller General
TITLE I FORMER VICE PRESIDENT PROTECTION ACT
122 STAT. 3560 PUBLIC LAW 110 326 SEPT. 26, 2008 Sept. 26, 2008 [H.R. 5938] Former Vice President Protection Act of 2008. 18 USC 1 note. Public Law 110 326 110th Congress An Act To amend title 18, United
ARTICLE THE NEXT GENERATION COMMUNICATIONS PRIVACY ACT ORIN S. KERR
ARTICLE THE NEXT GENERATION COMMUNICATIONS PRIVACY ACT ORIN S. KERR In 1986, Congress enacted the Electronic Communications Privacy Act (ECPA) to regulate government access to Internet communications and
ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair. AB 539 (Levine) As Introduced February 23, 2015
AB 539 Page 1 Date of Hearing: April 7, 2015 Counsel: Sandra Uribe ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair AB 539 (Levine) As Introduced February 23, 2015 SUMMARY: Authorizes the issuance
SECTION 1. SHORT TITLE.
--S.20-- S.20 One Hundred First Congress of the United States of America AT THE FIRST SESSION Begun and held at the City of Washington on Tuesday, the third day of January, one thousand nine hundred and
SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
The New Zealand Security Intelligence Service Amendment Bill
Government Bill Explanatory note General policy statement The implements Government policy decisions to update the interception warrant framework. Amendments are required to update and clarify the Service
Freedom of Information Act Request and Request for Expedited Processing
February 24, 2014 Arnetta Mallory - FOIA Initiatives Coordinator National Security Division U.S. Department of Justice 950 Pennsylvania Avenue, N.W. Room 6150 Washington, DC 20530-0001 BY EMAIL [email protected]
WikiLeaks Document Release
WikiLeaks Document Release February 2, 2009 Congressional Research Service Report 95-753 Presidential Emergency Powers: The So-Called War Powers Act of 1933 David M. Ackerman, American Law Division Updated
Public Law 95-515 95th Congress An Act
PUBLIC LAW 95-515 OCT. 25, 1978 92 STAT. 1811 Public Law 95-515 95th Congress An Act To regulate interstate commerce with respect to parimutuel wagering on horse- "*^*' '^ ' * racing, to maintain the stability
How To Clarify The Disclosure Of Information From Prohibited Personnel Practices
PUBLIC LAW 112 199 NOV. 27, 2012 126 STAT. 1465 Public Law 112 199 112th Congress An Act To amend chapter 23 of title 5, United States Code, to clarify the disclosures of information protected from prohibited
Department, Board, Or Commission Author Bill Number
BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain
Case 1:14-mj-02258-UA Document 1 Filed 10/31/14 Page 1 of 5
Case 1:14-mj-02258-UA Document 1 Filed 10/31/14 Page 1 of 5 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK --------------------------------------------------------------X IN RE ORDER REQUIRING
IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF WEST VIRGINIA PARKERSBURG DIVISION. v. CIVIL ACTION NO. 6:02-0911
IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF WEST VIRGINIA PARKERSBURG DIVISION BRIAN K. MARKS and JENNIFER D. MARKS, as individuals and on behalf of all others similarly situated,
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
Federal Criminal Court
No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled
CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79
CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79 AN ACT TO AMEND TITLE 14 OF THE DELAWARE CODE RELATING TO EDUCATIONAL DATA GOVERNANCE. BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE
When Can We Expect a Federal Data Breach Notification Law?
When Can We Expect a Federal Data Breach Notification Law? The Trials and Tribulations of Getting a DBN Bill through Congress. Alexi Madon Director of State Government Affairs, Midwest Cybersecurity Overview
Case 1:14-mj-00228-JMF Document 11 Filed 08/08/14 Page 1 of 21 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA
Case 1:14-mj-00228-JMF Document 11 Filed 08/08/14 Page 1 of 21 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) IN THE MATTER OF THE ) SEARCH OF INFORMATION ) ASSOCIATED WITH ) Magistrate Case
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
Snapchat Law Enforcement Guide
Snapchat Law Enforcement Guide Last Updated: June 1, 2015 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snapchat, Inc. 63 Market Street
Case 1:11-cv-04139-PAC Document 15 Filed 08/04/11 Page 1 of 5
Case 111-cv-04139-PAC Document 15 Filed 08/04/11 Page 1 of 5 USDC SDNY DOCUMENT ELECTRONICALLY FILED DOC # DATE FILED August 4, 2011 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ------------------------------------------------------------------X
Case 1:10-cr-00509-REB Document 111 Filed 05/06/11 USDC Colorado Page 1 of 11 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO
Case 1:10-cr-00509-REB Document 111 Filed 05/06/11 USDC Colorado Page 1 of 11 Criminal Case No. 10-cr-00509-01-REB UNITED STATES OF AMERICA, v. Plaintiff, 2. RAMONA CAMELIA FRICOSU, aka Ramona Smith, Defendant.
Compliance. TODAY September 2013. Fighting fraud, waste, and abuse. Ted Doolittle. See page 16. How to avoid the CIA: The high price of non-compliance
Compliance TODAY September 2013 a publication of the health care compliance association www.hcca-info.org Fighting fraud, waste, and abuse Ted Doolittle Deputy Director of the Center for Program Integrity,
HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act
PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret Maine law. For legal assistance, please contact a qualified attorney. Be it enacted by the People of the
Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology
Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology Cell-site simulator technology provides valuable assistance in support of important public safety objectives. Whether deployed
Computer Fraud & Abuse Act
Computer Fraud & Abuse Act Computer Fraud and Abuse Act (18 USC 1030) COMPUTER FRAUD AND ABUSE STATUTE ' 1030. Fraud and related activity in connection with computers (a) Whoever (1) knowingly accesses
Family Policy Compliance Office Guidelines: Disclosure of Education Records Concerning Registered Sex Offenders
Family Policy Compliance Office Guidelines: Disclosure of Education Records Concerning Registered Sex Offenders This guidance concerns an amendment to the Family Educational Rights and Privacy Act of 1974
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
Case 3:15-cr-05351-RJB Document 140 Filed 01/28/16 Page 1 of 17
Case :-cr-0-rjb Document 0 Filed 0// Page of UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT TACOMA UNITED STATES OF AMERICA, Plaintiff, v. JAY MICHAUD, Defendant. CASE NO. :-cr-0-rjb ORDER
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).
TITLE 28 - JUDICIARY AND JUDICIAL PROCEDURE PART II - DEPARTMENT OF JUSTICE CHAPTER 33 - FEDERAL BUREAU OF INVESTIGATION 532. Director of the Federal Bureau of Investigation The Attorney General may appoint
UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellee, v. MAYEL PEREZ-VALENCIA, AKA Santos Irizarry Castillo, AKA Miguel Martinez, AKA Miguel
SUPREME COURT OF ALABAMA
REL:10/08/2004 Ex parte National Western Life Ins. Co. and Ex parte United American Ins. Co. Notice: This opinion is subject to formal revision before publication in the advance sheets of Southern Reporter.
STATE OF OKLAHOMA. 2nd Session of the 53rd Legislature (2012) AS INTRODUCED
STATE OF OKLAHOMA nd Session of the rd Legislature () SENATE BILL AS INTRODUCED By: Crain An Act relating to Medicaid fraud; amending O.S., Sections 0 and 0, which relate to the Oklahoma Medicaid Program
