Government Pattern Analysis: Securing Terrorists While Preserving Privacy? Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster.

Slides:



Advertisements
Similar presentations
Telecom, Privacy & Security After September 11 Professor Peter P. Swire Ohio State University Ohio Telecommunications Industry Association October 2, 2001.
Advertisements

Privacy & Security After September 11 Professor Peter P. Swire Ohio State University University of Michigan Lecture December 4, 2001.
Privacy and National Security After September 11 Professor Peter P. Swire Ohio State University FLICC 2002 Forum Library of Congress March 19, 2002.
"Security and Privacy After September 11 Professor Peter P. Swire Ohio State Law School Consultant, Morrison & Foerster Privacy & Data Security Summit.
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
The Sunset of the Patriot Act Professor Peter P. Swire Moritz College of Law Ohio State University Winter College February 19, 2005.
A State of the Union for Privacy: Fall, 2002 Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP International Privacy Officers.
"Security and Privacy After September 11: The Healthcare Example Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP April.
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
Research and Privacy Under HIPAA Professor Peter P. Swire Moritz College of Law Ohio State University National Academy of Science Panel on Science, Technology.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
HIPAA and the War on Terrorism Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA Summit West June 7, 2003.
"Security and Privacy After September 11: Implications for Healthcare" Professor Peter P. Swire George Washington Law School Consultant, Morrison & Foerster.
Surviving Securely & Surviving Security -- Thoughts After 9/11 Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Critiquing the Idea of Total Information Awareness Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP International Association.
The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
FERPA What You Need to Know as a Wayne State Student Prepared by the Office of the Registrar.
USA Patriot Act Presented by: Kisha Thompson. Objectives potential threats potential vulnerabilities potential legal exposure To determine how the USA.
The PATRIOT Act, Technology and Records Privacy David L. Sobel General Counsel Electronic Privacy Information Center ECURE 2004 Arizona.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
Chapter 17 Law and Terrorism.
PPA 573 – Emergency Management and Homeland Security Lecture 9a– Homeland Security and Civil Liberties: USA Patriot Act.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
USA Patriot Act I  Immediately post 9/11  Expanded search authority  Roving wiretaps  Monitor private internet and traffic  Acquisition of library.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
Google maps and web mapping Group DP Daniel Stålnacke and Peter Winnberg.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Law and Terrorism “The laws will thus not be silent in time of war, but they will speak with a somewhat different voice.” Chief Justice Rehnquist.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
The Patriot Act Protecting the US or Violating People’s Freedoms.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Lecture 6: Civil Liberties, cont’d 2nd amendment Right to privacy Patriot Act/ 9/11.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
The USA PATRIOT Act An Overstatement of ALA Concerns?
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
The Patriot Act Is Spying on US citizens Ethical?
US History Ms. Gonzalez September 10, 2015 Aim: Should the Patriot Act be preserved? Do Now: Answer the question below. Be honest! 1. What is more important:
Aim: To what extent does the Patriot Act violate civil liberties? Do Now: Using your cell phone, take the following poll. “Of the 10 civil liberties guaranteed.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Bell Ringer At last year’s Super Bowl, the government secretly used face recognition software on people attending the event by using surveillance cameras.
Warrantless Wiretapping Sara Rudman Julie Sugarman Louise Matthiesen.
EXECUTIVE BRANCH TEST REVIEW Article II  What is the purpose of Article II?
Unit 2: Chapter 17.  Attacks on September 11, 2001 shook America to its core  Largest on U.S. soil since World War II  Feeling of vulnerability  Congress.
Law and Terrorism Chapter 17.
Chapter 13 CIVIL LIBERTIES: Ordered Liberty in America
Bellwork Think about this…. Historical Event
Legislative Powers!.
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Surveillance around the world
Legal Implications.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
"Security and Privacy After September 11: The Healthcare Example”
Prepared by the Office of the Registrar
Laws Governing Police Surveillance
“Court Records and Data Privacy: Online or Over the Line?”
The Right to Privacy vs. National Security
Presentation transcript:

Government Pattern Analysis: Securing Terrorists While Preserving Privacy? Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Congressional Internet Caucus March 20, 2003

Overview n Total Information Awareness Program – Admiral Poindexter n CAPPS II Program (airline passengers) – Transportation Safety Admin. n Legal overview n Our other speakers

Historical Context n 1960s and 70s -- excesses revealed n Surveillance of MLK, Jr. n Infiltration of political groups – FBI agents in KKK to Black Panthers, including participating in bombings, etc. – Fringe groups? Large fraction of delegates to 1972 Democratic National Convention under surveillance – Blackmail files on political officials

The Legal Reaction n Title III (1968) -- wiretaps only under strict, federal standards n Privacy Act, no secret dossiers n Foreign Intelligence Surveillance Act, 1978 n Right to Financial Privacy Act, 1978 n Other laws since – Govt. often needs subpoena, etc., to get data

Does the Constitution Limit Searches for Pattern Analysis? n Generally, no. n 4th Amendment limits searches of your person, places, papers, and effects n But most key records today held by outside parties n They can consent to give the data to government n Only statutes limit this disclosure.

What Has Changed Now? n Data searching so much better – Everyone has a mainframe – All connected over the Internet n September 11 – USA-PATRIOT Act and new government powers to get records n The events of this week

Todays Panel n Technology -- what can we expect from pattern analysis? n Advantages -- what pattern analysis should we choose to do? n Disadvantages -- what are the privacy and other competing concerns?