The USA PATRIOT Act Session 10 YSU Weapons of Mass Destruction Course.

Slides:



Advertisements
Similar presentations
Privacy of Communications: Snail Mail to Telephones.
Advertisements

Confidentiality and HIPAA
©The USA PATRIOT Act and You: A Legal Update Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford,
Chapter 13 Crimes Against the State Joel Samaha, 9th Ed.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
Is the Patriot Act Too Great a Threat to Our Civil Liberties? Michelle Schoonmaker Shane Fuhrman Rachel Almy Stacey Cremar.
NC State University - March David Drooz1 USA PATRIOT Federal anti- terrorism law Effective October 26, 2001 December 31, 2005, sunset for some of.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
PPA 573 – Emergency Management and Homeland Security Lecture 9a– Homeland Security and Civil Liberties: USA Patriot Act.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Summary Vs. Indictable examples procedures sentences.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
The USA PATRIOT Act Part 2 YSU – Weapons of Mass Destruction Session 11a.
AJ 104 Chapter 13 Electronic Surveillance and Other Searches.
1 CRIMES AGAINST THE JUSTICE SYSTEM Learning Domain 39 Learning Domain 39.
Chapter 18 - The Fourth Amendment and National Security.
Class 11 Internet Privacy Law Government Surveillance.
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
The U Visa for Immigrant Crime Victims Immigrant Law Center of Minnesota 450 N. Syndicate Street, Suite 175 St. Paul, MN (651) phone (651)
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
WHEN THE DEPARTMENT OF JUSTICE KNOCKS DOJ Enforcement Trends: What to Expect and How to Respond Jacqueline Arango Shareholder Akerman Senterfitt.
SSA, Todd Petrie The AMLA Presentation: 3/18/2009.
Computer Forensics Principles and Practices
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Policy Safe and Supportive Schools The Board of Education is committed to providing a safe, engaging, and supportive school climate: Behaviors that.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 6 Criminal Law and Cyber Crimes.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Chapter 18 - The Fourth Amendment and National Security.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Criminal Law for the Criminal Justice Professional Norman M. Garland Third Edition Copyright © 2012 The McGraw-Hill Companies, Inc. All Rights Reserved.
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Surveillance around the world
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
Employee Privacy and Privacy of Employee Information
DO NOW.
The University of Adelaide, School of Computer Science
Texas Search and Seizure
The Right to Privacy vs. National Security
Presentation transcript:

The USA PATRIOT Act Session 10 YSU Weapons of Mass Destruction Course

The Acronym Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism

What Changed? Criminal Investigations Foreign Intelligence Investigations FISA Money Laundering Alien Terrorists and Victims Computer Security Infrastructure Protection

What Changed? Electronic Commerce Electronic Government Internet Privacy

Criminal Investigations Surveillance Interpretations of 4 th Amendments Tier 1 Considerations –Protects Private Conversations –Berger v. New York (1967) –Katz v. United States (1967) –Smith v. Maryland (1979) Phone records not protected Not reasonable to expect protection

Response to Berger and Katz Omnibus Crime Control & Safe Streets Act –Title III Prevents eavesdropping on –Telephone conversations –Face-to-face conversations –Computer and other electronic communications

Title III Approval for surveillance –Approved by senior DOJ official –Must seek court order allowing surveillance –Must be for listed offense (predicate offense)

Some Predicate Offenses Sabotage of nuclear facilities or fuel, espionage, protection of trade secrets, sabotage, treason, riots, malicious mischief, destruction of vessels, piracy, unlawful payments to labor organizations, bribery of public officials and witnesses, any offense involving murder, kidnapping or robbery, bribery of bank officials, bribery in sporting contests, unlawful use of explosives, concealment of assets, transmission of wagering information, escape, influencing or injuring an officer, witness or juror, obstruction of criminal investigation, obstruction of state or local law enforcement, presidential or presidential staff assassination, kidnapping or assault, interference with commerce by threats or violence, foreign travel or transportation in support of racketeering, use of interstate commerce facilities in the commission of murder for hire, influencing an employee benefit program, laundering of monetary instruments, theft of interstate shipment, fraud by wire, radio or television, bank fraud, exploitation of children, transportation of stolen property, aircraft part fraud, threatening or retaliating against a Federal official, mail fraud, transactions with nuclear material, wrecking trains, false documents violations, drugs, forgery, aircraft piracy, aircraft parts fraud.

The Act Adds Other Offenses cyber crimes, terrorist acts of violence committed against Americans overseas, use of weapons of mass destruction, acts of terrorism transcending international boundaries, financial transactions with countries which support terrorists, providing material support to terrorists, providing material support to terrorists. New Title III Predicate Offenses

Court Order Describes duration Scope of surveillance Types of communications which may be seized Court notifies parties after expiration of court order

Not Protected Under 4th Telephone Records Held in 3 rd Party May be Viewed For Any Criminal Case –Subpoena –Court Order –Warrant –Protects Companies Who Cooperate –Notify the Subscriber Later

Stored s >180 Days Access with a warrant but they do not have to tell the subscriber. Plus the jurisdiction is all encompassing. So a court in New York can compel Yahoo to open their system to investigators in Northern California. And that includes stored voic as well.

Trap & Trace, Pen Registers Secret Caller ID Only Tells Who is Calling Who Participant Need Not be Told Court Order – Not restrictive Now applied to header and subject lines of .

Foreign Intelligence Investigations In the past, there was always question in criminal trials where information used against the defendant was gained through the use of a Foreign Intelligence Investigation because the rules are less stringent and not covered under Title III. i.e. Request for foreign surveillance was not covered under the predicate offense clause.

FISA Foreign Intelligence Surveillance Act FISA Court Hears Requests for Surveillance Warrants Previously “the purpose of the surveillance” After the Act “a purpose of the surveillance” Intelligence  Law Enforcement

The Act Allows Roving surveillance (court order need not state a listening instrument, target facility) FIA Court 7 to 11 Judges “a significant reason” vs. “the reason” Pen registers for Tangible items of customers now searchable (lockers, rental companies, hotels) No FISA just for 1 st Amend. exercise

Protective Measures Safeguard 1 – Abuse Prevention Safeguard 2 – Protects Cooperators

Abuse Prevention Expiration – Previously Abuses, You Sued the Agent –Punitive (possible) + Reasonable Atty Fee Today, You Can Recover –In FISA or Title III Violations no less than $10K DOJ Inspector General –Must receive complaints of C.L. infringements by DOJ staff

What Expires on ? Sharing of Grand Jury Information Seizure of Stored Voice Mail Seizure of Provider Customer Records Access to Cable Co. Records Sneak and Peek Pen Registers and Trap and Trace Assistance to Law Enforcement

Protection of Cooperators Immunity from prosecution of service providers who preserve records until an order can be filed. Allows disclosure of account information in emergency situation (prior allowed content but not records) Compensates service providers for pen register and trace installation modification.

Disclosure of Grand Jury Information Allowance of disclosure of information... –To any federal law enforcement, intelligence, protective, immigration, national defense or national security” officer to assist in the performance of his duties.

Money Laundering On Wednesday We Will Have Guest –Mr. Chris Garvin of Brennan Financial

Alien Terrorists and Victims Border Protection Detention and Removal Victims of 9-11

Border Protection Triple border patrols, customs and INS on Northern Border + equip upgrades Improve fingerprinting and develop biometric systems Closer monitoring of student visas Give airlines lists of suspected terrorists State Dept. shares info on gun runners, terror, drugs, slave trade

Detention and Removal If you were inadmissible when you came in – you are out If you engage in terrorist activity – you are out. Terrorism categories expanded to deny entry –Engaging in, representing organization, espousing terror, being a spouse or child associated w/terror, intending to engage in activities that could endanger Americans

Engaging in Terror Soliciting on behalf of terror Providing material to a terror organization Recruiting on behalf of terror Using place or prominence to espouse terror AG may detain for 7 days –Initiate to remove or release –If held – review every 6 months to determine if release would threaten national security.

Federal Offense – Life in Prison Attack mass transit Biological attack or other destructive device on mass transit Impair signals Endanger operators Act with intent to kill on mass transit Convey false alarm regarding offenses Attempt to violate this section Threaten or conspire to violate this section

Harboring Harboring a terrorist –$250,000 fine up to 10 years Predicate offense list –Destruction of aircraft, CBRNI, bombing fed. bldgs, destruction of energy facilities, international terror, nuclear sabotage, air piracy. –Fines increased for dozens of other offenses

Other Changes Rewards Expands Posse Comitatus Authorizes “sneak and peek” Nationwide warrants Eases govt access to confidential info AG may collect DNA on terror criminals Statute of limitations extended for terror

“Sneak and Peek” 4 th Amendment –Requires officer to knock and announce purpose before executing warrant Rule 41 – Fed. Rule of Criminal Procedure –May enter w/o presence but must leave copy of warrant and what was taken. Sneak and Peak

“Sneak and Peek” Authorizes officers to secretly enter, either physically or virtually’ conduct a search, observe, take measurements, conduct examinations, smell, take pictures, copy documents, download or transmit computer files and depart without taking any tangible evidence or leaving notice of their presence. They are told at a later date. But 4 th Amendment does recognize “exigent circumstances” where compliance will lead to flight, destruction of evidence or may endanger officers.

Coming Wednesday Computer Security Infrastructure Protection Electronic Commerce Electronic Government Internet Privacy