Monday, February 15, 2010
Key Provision of the USA Patriot Act
Sixteen provisions of the USA Patriot Act are set to expire Dec.31 if not renewed. The Senate voted Wednesday night to extent them six months. Still has to be approve by the House.
The provision are:
Section 201- Gives federal officials the authority to intercept wire, spoken and electronic communications relating a terrorism.
Section 202- Gives federal officials the authority to intercept wire, spoken and electronic communication relating to computer fraud and abuse offenses.
Section 203- Permits the sharing of grand jury information that involves foreign intelligent or counterintelligence with federal law
enforcement,intelligent,protective,immigration,national defense or national security officials.
Story Continues Below
Section 203- Gives foreign intelligence or counterintelligence officers the ability to share foreign intelligence information obtained as part of a criminal investigation with the law enforcement.
Section 204- Makes clear that nothing in the law regarding pen registers - an electronic device which record all numbers dialed from a particular phone line_stop the government's ability to obtain foreign intelligence information.
Section 206- Allows federal officials to issue roving "John Doe" wiretaps, which allow investigator to listen in on any telephone and tap any computer they think a suspected spy or terrorist might use.
Section 207- Increase the amount of time that federal officials may watch people they suspect are spies or terrorists.
Section 209- Permit the seizure of voice mail message under a warrant.
Section 212- Permits Internet service providers and other electronics communication and remote computing service providers to hand over records and e- mail to federal officials in emergency situation.
Section 214- Allow use of a pen register or trap and trace devices that record originating phone number of all incoming calls in international terrorism or spy investigation.
Section 215- Authorize federal officials to obtain "tangible items" like business records, including those from libraries and bookstores, for foreign intelligence and international terrorism investigation.
Section 217- Makes it lawful to intercept the wire or electronic communication of a computer hacker or intruder in certain circumstances.
Section 218- Allows federal officials to wiretap or watch suspects if foreign intelligence gathering is a "significant purpose" for seeking a Federal Intelligence Surveillance Act order. The pre-Patriot Act standard said officials could ask for the surveillance only if it was the sole or main purpose.
Section 220- Provides for nationwide service of search warrants for electronic evidence.
Section 223- Amends the federal criminal code to provide for administrative discipline of federal officers or employees who violate prohibitions against unauthorized disclosures of information gathered under this act.
Section 225- Amends FISA to prohibit lawsuits against people or companies that provide information to federal officials for a terrorism investigation.
SOURCE:NewMax.comWires♠♠♠♠♠♠
Monday, January 25, 2010
Activity #4 PRIVACY PROTECTION AND THE LAW

The scope of applicability of privacy laws is called expectation of privacy.
♣The Computer Matching and Privacy Protection Act♣
The Computer Matching and Privacy Protection Act of 1988 (5 U.S.C. 552a(o) et seq.) amended the Privacy Act by describing the manner in which computer matching involving Federal agencies could be performed and by adding certain protections for individuals applying for and receiving Federal benefits.
As amended by the Computer Matching and Privacy Protection Act, the Privacy Act requires Federal agencies involved in computer matching programs to:
- Negotiate written agreements with the other agency or agencies participating in the matching programs;
- Obtain the relevant Data Integrity Boards' approval of the match agreements;
- Furnish detailed reports about matching programs to Congress and OMB;
- Notify applicants and beneficiaries that their records are subject to matching; and
- Verify match findings before reducing, suspending, terminating, or denying an individual's benefits or payments.
Activity.#3 ; WHAT IS PRIVACY?

The definition of Privacy are the following;
- the quality of being secluded from the presence or view of others.
- the condition of being concealed or hidden.
- Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.
- The state of being private; the state of not being seen by others.
- Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.
- Privacy is your right to control what happens with personal information about you.
Monday, January 11, 2010
COPUTER CRIME AND THEIR OBJECTIVES♥♥♥♥
♠persons, who are not in labor relations with the victim organization, but are related to it;
♠employees of the organization that occupy responsible positions;
♠employees-users of computers that abuse their office.♥♥♥♥♥♥
The Computer Crimes
All computer criminals can be divided into the following separate groups by purposes and spheres of their activities:
1. Hackers 4.Computer Pirates
3.Carders Pay 6.Phreaker (phone + break = phreak)
ZERO-DAY ATTACK☻☻☻♥♥♥

Zero -Day Attack as it is defines as:♥♥♥♥♥♥♥♥
A zero day attack, also known as a zero hour attack, takes advantage of computer vulnerabilities that do not currently have a solution. Typically, a software company will discover a bug or problem with a piece of software after it has been released and will offer a patch another piece of software meant to fix the original issue. A zero day attack will take advantage of that problem before a patch has been created. It is named zero day because it occurs before the first day the vulnerability is known.♣♣♣♣♦♦♦♦