Statement of Christopher Humphrey Section Chief, Cyber Division

Slides:



Advertisements
Similar presentations
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Advertisements

Alabama’s Ban on Texting While Driving 32-5A-350
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
The use of Inaccurate Can Liner Thickness and Weight Labels on Non-Consumer Product for Sale.
Missouri Gaming Commission Charitable Games Division Best Practices Presented by Jane Bax Charitable Games Manager &Rachel Farr Senior Auditor.
1 Caste based Discrimination and Untouchability (Offence and Punishment) Act 2011 Kathamandu, 14 th September 2011 Adv. Ratna K. Shrestha Human Rights/Legal.
Lecturer: Miljen Matijašević Session 8, 7 May 2014.
US Constitution Jeopardy Ms. Buck - Civics. The Articles The Principles The Bill of Rights Criminal Rights I Plead the Fifth
The Noise Pollution and Abatement Act of 1972 (or Noise Control Act of 1972, , 86 Stat. 1234, 42 U.S.C U.S.C. 4918) is a statute of the.
Search and Seizure on the Premises of the Danish Parliament (the Folketing) Conditions, background and practice.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
PowerPoint® Slides to Accompany
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
Remarks of Kristen Pinhey Competition Law Officer Competition Bureau Canada Unannounced Inspections in Canada International Competition Network, 2013 Cartel.
1/06/2015Copyright, Dan Svantesson Law 105 Communication and the law.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
Lecturer: Miljen Matijašević G10, room 6, Tue 15:30-16:30 Session 9, 16 Dec 2014.
1 China IP Enforcement in the Entertainment Industries Dr. James Luo Managing Partner Lawjay Partners Berkeley, Oct 2012.
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
Modernizing Export Controls ABA International Law Section Matthew S. Borman Acting Assistant Secretary for Export Administration Bureau of Industry and.
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Mapp v Ohio By: Gavin Koonts 10/27/13 Block 2. Mapp v Ohio  Dollree Mapp v State of Ohio  Argued: March 29, 1961  Decided: June 19, 1961.
Chapter 1: Ohio’s Criminal Justice System Chapter 1: Introduction and Ohio’s Place in the Nation Copyright © 2015 Carolina Academic Press. All rights reserved.
Customer Service Enforcement After AB 2987 John Risk Communications Support Group, Inc. (c) 2006 John Risk Communications Support Group, Inc. (c) 2006.
Cal-OSHA and Labor Code Understanding the Law And Its Consequences
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Bell Work: 5/8/13 What is seditious speech? What is prior restraint?
Ideal Jobs FBI. Field Criminal Justice Criminal Justice is study of the law and is mostly of thinking of the Criminal mind. Jobs: Local law Enforcement:
The United States Constitution The Supreme Law of the Land.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
3.3 The Informal Amendment Process & The Bill of Rights.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Powers of Environment Inspectors and enforcement tools Attorney General's office Who are the Environmental Inspectors What are their powers? Enforcement.
The Bill of Rights The First Fundamental Changes of the Constitution.
Bell Work: 5/3/12 What is due process? – Hint: look on pg. 564 if you don’t remember!
Aim: What is Criminal Justice? Do Now: What do you think is involved in the criminal justice system?
Chapter 10 The Criminal Process. A.k.a. Procedural criminal law Two most essential elements of Canadian Criminal Process are: - Truth - Justice.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
The Investigation Phase. An arrest takes place when a person is suspected of crime and taken into custody.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
Arrest and Detainment How do you know you’ve been arrested?
Magruder’s American Government
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
CS154 Formal Languages and Computability Thaddeus Aid Department of Computer Science San Jose State University Spring 2016 Creative Commons Attribution-ShareAlike.
Jeffrey miller Marist school Emory national debate institute
Unit 4 Seminar. Tell me what the Miranda warning is and what it means to you.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Applications of Cryptography
Enter the Bill of Rights
Chambers v. Maroney, Correctional Superintendent
Grab a book off the shelf and look it up. (Article V)
Director and Chief of Police
Aboriginal People and The Canadian Constitution
ICN Cartel Working Group SG 1 Call Series Linda Plumpton
Analyze The Exclusionary Rule
The University of Adelaide, School of Computer Science
Controlled Substance Forfeiture
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
AMENDMENTS U.S. Bill Of Rights.
AMENDMENTS U.S. Bill Of Rights.
Ch. 3-1 Criminal Procedure and the Constitution
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

The Encryption Control Act: A Necessary Tool for Modern Law Enforcement Statement of Christopher Humphrey Section Chief, Cyber Division Federal Bureau of Investigation Before the House Committee on Energy and Commerce

The Current State of Affairs Scalable Encryption is Publicly Available PGP RC4 and others Scalable Encryption is Always Strong Strong Encryption Makes Digital Searches Useless Seizure of Records Interception of Communications Failed Strategies Classification Brute Force

The Encryption Control Act All encryption products manufactured or imported for sale or use in the United States must include features that permit immediate decryption of the encrypted data upon the receipt of a valid court order. Whoever knowingly manufactures, imports, or sells an encryption product that does not meet the requirements of this Act shall be subject to a term of imprisonment of not more than five years, a fine of not more than two hundred fifty thousand dollars, or both. It shall NOT be unlawful to use any encryption product purchased or in use prior to January 31 of the year following passage of this Act.

Effects of Legislation Stops criminals from evading warranted search Wiretapping and interception effective again Seizure of computer records will yield usable evidence Easy on encryption firms Lets already-manufactured technology to still be used Gives firms ample time to modify algorithms No Constitutional concerns Back-door would only be used on warranted searches and interceptions, not on normal peoples' data System could be designed to keep unwarranted police searches from having access to decryption