Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.

Slides:



Advertisements
Similar presentations
Telecom, Privacy & Security After September 11 Professor Peter P. Swire Ohio State University Ohio Telecommunications Industry Association October 2, 2001.
Advertisements

Privacy & Security After September 11 Professor Peter P. Swire Ohio State University University of Michigan Lecture December 4, 2001.
Privacy and National Security After September 11 Professor Peter P. Swire Ohio State University FLICC 2002 Forum Library of Congress March 19, 2002.
The Chief Privacy Officer for the U.S. Government Professor Peter P. Swire Ohio State University Visiting, George Washington University Privacy Officers.
"Security and Privacy After September 11 Professor Peter P. Swire Ohio State Law School Consultant, Morrison & Foerster Privacy & Data Security Summit.
Reflections on the White House Privacy Office Peter P. Swire U.S. Chief Counselor for Privacy, OSU College of Law, 2001-present CFP, March 8,
Why E-Commerce is Like a Bottle of Tylenol Professor Peter P. Swire Ohio State Law School Conference on New Technologies and International Governance February.
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
The Sunset of the Patriot Act Professor Peter P. Swire Moritz College of Law Ohio State University Winter College February 19, 2005.
Privacy Laws and First Amendment Content Professor Peter P. Swire Ohio State University John Marshall Symposium on Copyright & Privacy Conference November.
"Security and Privacy After September 11: The Healthcare Example Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP April.
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
HIPAA and the War on Terrorism Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA Summit West June 7, 2003.
"Security and Privacy After September 11: Implications for Healthcare" Professor Peter P. Swire George Washington Law School Consultant, Morrison & Foerster.
Mental Health Issues & Information Sharing Professor Peter P. Swire The Ohio State University NAAG Task Force on School Safety July 5, 2007.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
Government Pattern Analysis: Securing Terrorists While Preserving Privacy? Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
©The USA PATRIOT Act and You: A Legal Update Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford,
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Technology for Computer Forensics by Alicia Castro.
Is the Patriot Act Constitutional? Eddie Nicolau Beloit College, Beloit, WI Introduction In the past few years, the current United States Government has.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
Chapter 18 - The Fourth Amendment and National Security.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
The Patriot Act Protecting the US or Violating People’s Freedoms.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Chapter 18 - The Fourth Amendment and National Security.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
4 th Amendment Timothy Bian, Myris Kramsch, Mazen Elhosseiny, Daniel Alday, John Scott, Kartik Raju.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
The Patriot Act Is Spying on US citizens Ethical?
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Bellwork Think about this…. Historical Event
Courts System Search Warrants.
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Intercepting Communications
Confidentiality October 14, 2005.
"Security and Privacy After September 11: The Healthcare Example”
Laws Governing Police Surveillance
U.S. Intelligence Oversight Reforms & the Cloud Act
The University of Adelaide, School of Computer Science
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The Right to Privacy vs. National Security
Presentation transcript:

Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002

Overview of the Talk n Overview of electronic surveillance, before and after September 11 n Security vs. privacy n Security and privacy

Wiretaps and Surveillance n History of wiretaps n 2000 Administration proposal n 2001 USA Patriot Act

Wiretap History n 1920s Olmstead – Wiretaps permitted by police without warrant where tap applied outside your home n 1960s Katz – Reasonable expectation of privacy, even in a phone booth n 1968 Title III – Strict rules for content, more than probable cause, as a last resort, reporting requirements

History (cont.) n 1984 ECPA – Some protections for – Some protections for to/from information; pen registers (who you call); trap and trace (who calls you)

2000 Administration Proposal n How to update wiretap and surveillance for the Internet age n 15-agency White House working group n Legislation proposed June, 2000 – S – Hearings and mark-up in House Judiciary, further toward privacy than our proposal

2000 Administration Proposal n Update telephone era language n Upgrade and web protections to same as telephone calls n Identify new obstacles to law enforcement from the new technology n Sense of responsibility -- assure privacy, give law enforcement tools it needs

2001 USA Patriot Act n Introduced less than a week after September 11 n Key provisions often have a point, but maybe went too far n 4 year sunset for many surveillance provisions and what to do next

Emergency orders n Before, imminent threat of serious harm to get wiretap before a court order n Now, for any ongoing computer attack, or else ability to trace back may be lost n For anything affecting a national security interest n Are these too broad?

Roving taps n Old days, order for each phone n What if suspect buys a dozen disposable cell phones? Uses someone elses computer? n But, how far can the order rove? Anyone in the public library? n Problem -- less of a suppression remedy for and web use

Nationwide trap and trace n Old days, serve order on ATT and it was effective nationwide n Today, may travel through a half- dozen providers, have needed that many court orders n New law -- one order effective nationwide n Query -- order from a judge in Idaho, served late at night, how do you challenge that?

Computer trespasser exception n Previous law: – ISP can monitor its own system – ISP can give evidence of yesterdays attack – ISP cannot invite law enforcement in to catch the burglars n Problem for: – DOD and many hack attacks – Small system owners who need help

Computer trespasser proposal n Law enforcement can surf behind if: – Targets person who accesses a computer without authorization – System owner consents – Lawful investigation – Law enforcement reasonably believes that the information will be relevant – Interception does not acquire communications other than those transmitted to or from the trespasser

Computer trespasser n Issues of concern: – Never a hearing in Congress on it – No time limit on each use – No reporting requirement – FBI can ask the ISP to invite it in, and then camp at ISP permanently – Limited suppression remedy if go outside permitted scope

II. Security & Privacy After 9/11 n Less tolerance for hackers and other unauthorized use n Cyber-security and the need to protect critical infrastructures such as payments system, electricity grid, & telephone system n Greater tolerance for surveillance, which many people believe is justified by greater risks

Security vs. Privacy n Security sometimes means greater surveillance, information gathering, & information sharing n USA Patriot increases surveillance powers n Computer trespasser exception n Moral suasion to report possible terrorists

Security and Privacy n Good data handling practices become more important -- good security protects information against unauthorized use n Audit trails, accounting become more obviously desirable -- helps fight sloppy privacy practices n Part of system upgrade for security will be system upgrade for other requirements, such as privacy

In Conclusion n USA Patriot has 4 year sunset of many of the surveillance provisions n Imagine an architecture that meets legitimate security needs and also respects privacy n Need accountability to ensure the new powers are used wisely n Our homework -- how to do that wisely

Contact Information n Professor Peter P. Swire n phone: (301) n n web: