+ All Categories
Home > Documents > The USA-Patriot Act The Basics for Information Technologies and Higher Education.

The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Date post: 28-Mar-2015
Category:
Upload: bailee-poor
View: 216 times
Download: 0 times
Share this document with a friend
Popular Tags:
32
The USA-Patriot Act The Basics for Information Technologies and Higher Education
Transcript
Page 1: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

The USA-Patriot Act

The Basics for Information Technologies and Higher Education

Page 2: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

USA-Patriot Act:Basics

• Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Acts

• Signed into law on October 26, 2001

• One of the longest pieces of emergency legislation passed in one of the shortest periods of time in American history

Page 3: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

History of Emergency Acts and Government Actions

• Alien and Sedition Acts of 1790’s

• Suspension of Habeas Corpus during Civil War

• Abrams: Muting of Free Speech during WWI

• Red Scare and Palmer Raids in post WWI period

Page 4: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

History of Emergency Acts and Government Actions

• FDR, Great Depression New Deal Legislation• Internment of Japanese during the WWII• Blacklisting and Congressional Hearings in the

McCarthy, Anti-Communist Era, Post WWII era • Wiretapping and general harassment of

government critics in civil rights and Vietnam War era

Page 5: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

USA-Patriot Act: Basics

• Ten Sections covering a variety of areas, including banking, money laundering, surveillance, border protection, victims’ support, information sharing within the infrastructure and the strengthening of criminal laws against terrorism.

• Severability clause– To protect against the whole the potential

constitutional violation of a single section

Page 6: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Definition of Terrorism

• Act divides definition into two parts– Foreign– Domestic

• For the purposes of our discussion, the definition for domestic terrorism is the more helpful to keep in mind.

Page 7: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Definition of Terrorism

• Domestic– “the term `domestic terrorism' means activities…[that ]

involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State; appear to be intended (i) to intimidate or coerce a civilian population; (ii) to influence the policy of a government by intimidation or coercion; or (iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and occur primarily within the territorial jurisdiction of the United States.

Page 8: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Title I: Enhancing Domestic Security Against Terrorism

• Section 103: Increased funding for the Technical Support Center– Addition to established funding for section 811

of the Antiterrorism and Effective Death Penalty Act of 1996

– $200,000,000 addition each year for 2002-2004

Page 9: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Title I: Enhancing Domestic Security Against Terrorism

• Section 105: Expansion of National Electronic Crime Task Force Initiative– Director of US Secret Service shall create national task

force on the New York Electronic Crimes Task Force model

– Operate throughout the United States

– For the purpose of “preventing, detecting and investigating various forms of electronic crimes.”

Page 10: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Overview of Title II: Enhanced Surveillance Procedures

• Sharing of Information– Law enforcement with federal agencies

• Obtaining Records– FERPA (507 of Title V)– FISA– ECPA

• Rewording to Include Electronic Communications– “routing,” “network addresses,” “signaling”

Page 11: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Overview of Title II: Enhanced Surveillance Procedures

• Computer Trespass– Deputizing owners and operators of IT

• New Access– “Rubber Stamp” and National Service for Subpoenas

• Compensations– FBI compensate ISP

– Civil actions for computer abuse over $5,000 (814 of Title VIII).

Page 12: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Patriot Act Amends Existing Legislation

• FERPA– Family Education Records and Privacy Act

1974

• FISA– Foreign Intelligence Surveillance Act 1978

• ECPA– Electronic Communications Privacy Act 1986

Page 13: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Family Education Records and Privacy Act

• Originally passed in 1974, subseq. amended– Historical foundation in anti-war protests

protection for students’ records, “transparency” and access of those records for the individual student

– Recognize shift from in loco parentis– Already existing “health and safety” exception

for the individual student

Page 14: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Family Education Rights and Privacy Act, 507 of Title V

• Patriot Act amends to permit educational institutions to disclose educational records to federal law enforcement officials without student consent:– If a U.S. Assistant Attorney General, or similarly

ranked official, obtains a court order relevant to terrorism investigation

– Institution is not liable, and need not maintain a record of the transaction

– Distinct from the “health and safety” already existing exception directed to health and safety of others.

Page 15: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Ancillary to FERPA

• National Center for Education Statistics– Federal officials can have access to survey

information, which is otherwise held confidential

• Monitoring of Foreign Students– Full implementation of existing Immigration

and Naturalization Service law regarding information about students

Page 16: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Foreign Intelligence Surveillance Act 1978

• Early recognition, if not prescience, about the potential for terrorist activities on American soil or affecting American interests internationally

• Foreign relations exception to the legislative directions towards privacy as a result of the Church Committee and reflected in acts such as Freedom of Information Act and Family Educational Records Privacy Act

Page 17: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Foreign Intelligence Surveillance Act

• FISA Court (pre-Patriot Act)– Seven federal judges

» Post Patriot Act: eleven and with residence restrictions in contemplation of an increase in requests and need for quick process of them

– Meet in closed session– Content of applications permanently closed– Only statistics, and annual vice-president’s report to

Congress of applications and approved.– Example of Moussaoui Flight School case– Results in search warrant or subpoena

» Post Patriot Act: reduced standard for approval

Page 18: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Patriot Act: Section 501 Amendments of FISA

• Business Records– FBI can seize with a court order certain business

records pursuant to an investigation of “international terrorism or other clandestine intelligence activities…”

– Prohibits record keeper to disclosure FBI action to anyone “other than those persons necessary to produce the tangible things under this section…”

– Investigation “not to be conducted of a United States person solely upon the basis of activities protected by the first amendment…”

Page 19: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Patriot Act Amendments of FISA

• Query: Does this mean I can’t tell my supervisor?– Chain of command– Chain of custody– But not outside of that loop!

• Potential for constitutional challenge under free speech?

• The “whistleblower’s” ethical dilemma

Page 20: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Electronic Communications Privacy Act of 1986

• What is it? – Wiretapping Act for the Internet

• What is the “Wiretapping Act?”

– Olmstead 1928

– Katz 1967

– Omnibus Crime Control and Safe Streets Act of 1968 is the actual “Wiretapping Act”

• ECPA brings those same legal protections of telephonic communications to electronic environment

Page 21: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

ECPA: What Does It Protect?

• Ideally the privacy of communications in electronic media

• Pre-Patriot Act list of exceptions– Usual course of business

• But not disclosure to third parties• Wireless: distinction between listening and disclosing

– Authorized law enforcement• Court or Administrative Order• Search Warrant or Subpoena • Executive Order 12333 Letter

Page 22: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

ECPA: To Whom Does It Apply?

• Statutory Language:• “…providers of Internet service to the public”

• Does it apply to colleges and universities? • No case law on point

• Anderson Consulting: EPCA does not apply

• Digital Millennium Copyright Act as potential “safe harbor” model of distinction between students and staff/faculty?

• Areas where there is service to the public, i.e. list serves?

• General Rule• Act as if it does, but hold question as potential defense

Page 23: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Patriot Act Amendments of ECPA

• New “emergency” disclosure• “Imminent danger to life and limb”

• New “required disclosure”• “Rubber-stamping subpoenas”

– Below “probable cause”

– “Routing:” Pen registers and trap and trace devices

– Content is the constitutional question

Page 24: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Required Disclosure: Voice Mail 209 Patriot Act/2703

• Pre-Patriot Act– Obtainable only through highest level of court

order corresponding to transmission (real time) of communications

• Like telephone wiretap order

• Post Patriot– Now obtainable like any e-mail

• Still with court order, but lower standard

Page 25: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Nation-Wide Service for Electronic Search Warrants

Creates a “national subpoena” obtainable from magistrates in federal district courts which can be extended to any other jurisdiction– i.e. if FBI in Washington want something in

California, they can apply for warrant in Washington federal court and have it apply to California.

Page 26: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Patriot Act Amendments of ECPA

• Computer Trespass• Owner/Operator consent for federal intervention

• So long as owner/operator reasonably believes investigation is relevant to computer trespass

• Investigation of it and no other

• No authorization required

• No limits set, e.g. stop

• No restraint on return with authorization based on information gathered during the invited investigation

• No guarantee it is constitutional

• Sunset provision

Page 27: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

What is Purpose of New Computer Trespass?

• Sections 217(1) and (2) simply alleviates owners and operators of protected computers of potential ECPA liability for their investigations and/or disclosures under certain circumstances.

• Facilitate communications between networks – private and public – and federal law enforcement

Page 28: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

So What is the Worry?

• Autonomy of higher education to maintain its networks– The “router” and the FBI story

• Fine line between requesting and inquiry?– IP hopping or rogue scans as sign– Helpful call from federal law enforcement– Diminution of Fourth Amendment:

• No “probable cause”• No “judicial oversight”• No “reasonable expectation of privacy” means no exclusionary

rule in court

Page 29: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Areas of Potential Abuse and/or Concern

• Constitutional – First Amendment; speech

– Fourth, Fifth and Sixth criminal procedure

– Separation of powers (agencies as 4th branch)

• Privacy– Colleges/University Autonomy

– FISA “business records”

– FERPA new exception

– ECPA disclosures

Page 30: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Areas of Potential Abuse and/or Concern

• Federalism– National service

• Case law definitions– “Public”– “Emergency” – “Color of law”– “Network Addresses,” “Routing,” “Customer Information”

• Deputized “Owner”– Computer Trespass– Policy and Procedure

Page 31: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

What Must Be Done?

• Work together to address crime and terrorism• Maintain free speech and inquiry• Hold forth on our constitutional protections• Import that sensibility of constitutional protections

and due process into internal policies and procedures

• Watch and react politically depending on how this legislation makes its way into the daily life of American society

Page 32: The USA-Patriot Act The Basics for Information Technologies and Higher Education.

Conclusion

• Policy, protocols and procedures that engage the law in concert with the special mission of American higher education and the particular cultures of our colleges and universities go a long way to preserve our traditional autonomy.


Recommended