Monday, February 15, 2010

Key Provision of the USA Patriot Act

key Provision of USA Patriot Act

Sixteen provisions of the USA Patriot Act are set to expire Dec.31 if not renewed. The Senate voted Wednesday night to extent them six months. Still has to be approve by the House.

The provision are:

Section 201- Gives federal officials the authority to intercept wire, spoken and electronic communications relating a terrorism.

Section 202- Gives federal officials the authority to intercept wire, spoken and electronic communication relating to computer fraud and abuse offenses.

Section 203- Permits the sharing of grand jury information that involves foreign intelligent or counterintelligence with federal law
enforcement,intelligent,protective,immigration,national defense or national security officials.


Story Continues Below

Section 203- Gives foreign intelligence or counterintelligence officers the ability to share foreign intelligence information obtained as part of a criminal investigation with the law enforcement.

Section 204- Makes clear that nothing in the law regarding pen registers - an electronic device which record all numbers dialed from a particular phone line_stop the government's ability to obtain foreign intelligence information.

Section 206- Allows federal officials to issue roving "John Doe" wiretaps, which allow investigator to listen in on any telephone and tap any computer they think a suspected spy or terrorist might use.

Section 207- Increase the amount of time that federal officials may watch people they suspect are spies or terrorists.

Section 209- Permit the seizure of voice mail message under a warrant.

Section 212- Permits Internet service providers and other electronics communication and remote computing service providers to hand over records and e- mail to federal officials in emergency situation.

Section 214- Allow use of a pen register or trap and trace devices that record originating phone number of all incoming calls in international terrorism or spy investigation.

Section 215- Authorize federal officials to obtain "tangible items" like business records, including those from libraries and bookstores, for foreign intelligence and international terrorism investigation.

Section 217- Makes it lawful to intercept the wire or electronic communication of a computer hacker or intruder in certain circumstances.

Section 218- Allows federal officials to wiretap or watch suspects if foreign intelligence gathering is a "significant purpose" for seeking a Federal Intelligence Surveillance Act order. The pre-Patriot Act standard said officials could ask for the surveillance only if it was the sole or main purpose.

Section 220- Provides for nationwide service of search warrants for electronic evidence.

Section 223- Amends the federal criminal code to provide for administrative discipline of federal officers or employees who violate prohibitions against unauthorized disclosures of information gathered under this act.

Section 225- Amends FISA to prohibit lawsuits against people or companies that provide information to federal officials for a terrorism investigation.

SOURCE:NewMax.comWires♠♠♠♠♠♠

Monday, January 25, 2010

Activity #4 PRIVACY PROTECTION AND THE LAW


Privacy law is the area of law concerned with the protection and preservation of the privacy rights of individuals. Increasingly, governments and other public as well as private organizations collect vast amounts of personal information about individuals for a variety of purposes. The law of privacy regulates the type of information which may be collected and how this information may be used.

The scope of applicability of privacy laws is called expectation of privacy.

The Computer Matching and Privacy Protection Act

The Computer Matching and Privacy Protection Act of 1988 (5 U.S.C. 552a(o) et seq.) amended the Privacy Act by describing the manner in which computer matching involving Federal agencies could be performed and by adding certain protections for individuals applying for and receiving Federal benefits.

As amended by the Computer Matching and Privacy Protection Act, the Privacy Act requires Federal agencies involved in computer matching programs to:

  1. Negotiate written agreements with the other agency or agencies participating in the matching programs;
  2. Obtain the relevant Data Integrity Boards' approval of the match agreements;
  3. Furnish detailed reports about matching programs to Congress and OMB;
  4. Notify applicants and beneficiaries that their records are subject to matching; and
  5. Verify match findings before reducing, suspending, terminating, or denying an individual's benefits or payments.
Though the Computer Matching and Privacy Protection Act certainly involves detailed procedures, including obscure 'Data Integrity Boards,' it is probably most notable for the fact that it institutionalizes sharing of data among federal government agencies. Information collected for one purpose may be used for different purposes by a different federal agency. Though integrity and fairness seem assured by the Act, privacy is not.♣♣♣♣♣

Activity.#3 ; WHAT IS PRIVACY?


The word "privacy" has been used to describe many concerns with the modern world. It is a complex concept even before other concerns are lumped with it. The concept of "privacy" deserves to be carefully examined. It defies easy definition, and many proposals to protect privacy have gone forward without a clear articulation of what privacy really is.

The definition of Privacy are the following;
  • the quality of being secluded from the presence or view of others.
  • the condition of being concealed or hidden.
  • Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.
  • The state of being private; the state of not being seen by others.
  • Privacy may be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.
  • Privacy is your right to control what happens with personal information about you.
For me the privacy is that you don't want to know any body else about you ,you are hidden something. Like your personal life and other matters in your life that you don't want to revealed it.

Monday, January 11, 2010

COPUTER CRIME AND THEIR OBJECTIVES♥♥♥♥

Persons committing computer crimes also may be divided in the following three big groups by the corresponding sign:
♠persons, who are not in labor relations with the victim organization, but are related to it;
♠employees of the organization that occupy responsible positions;
♠employees-users of computers that abuse their office.♥♥♥♥♥♥

The Computer Crimes
All computer criminals can be divided into the following separate groups by purposes and spheres of their activities:

1. Hackers 4.Computer Pirates
2. Crackers 5.Cyber Crow
3.Carders Pay 6.Phreaker (phone + break = phreak)

ZERO-DAY ATTACK☻☻☻♥♥♥


Zero -Day Attack as it is defines as:♥♥♥♥♥♥♥♥

A zero day attack, also known as a zero hour attack, takes advantage of computer vulnerabilities that do not currently have a solution. Typically, a software company will discover a bug or problem with a piece of software after it has been released and will offer a patch another piece of software meant to fix the original issue. A zero day attack will take advantage of that problem before a patch has been created. It is named zero day because it occurs before the first day the vulnerability is known.♣♣♣♣♦♦♦♦

This Zero day attack taking advantage to those computer vulnerabilities. So if your computer has no wall or I mean if you have no fire walls to protect your computer. For example in not a particular situation in the computer but in our life aspect. Say for instance if you have a store then in your side you have a competent of course your product will not totally "bibilhin" of the consumer unless if you will not make the price low. So in that case you are taking advantage to your competent.•••◘◘♠♠♠♠

Monday, January 4, 2010

WHAT WOULD YOU DO?

If my friend told me about his planned to developing a worm to attack the administrative system at our college. I will gonna stop his planned about what he want to do in the administrative system, because event its harmless but it will be cause a possible problem to the work station and to those person who was affected in this matter if possible will be happen. But as long as you their to give advice and to be aware him about the possible problem.There is no to be bother about.

WHAT WOULD YOU DO?

If I will be hired as the IT Security Consultant to fix the security problem at the manufacturing company as soon as possible I will start to fix those problem.Given time and 90 days and given the money which is 1Million Dollar to be expend.But its hard because you do not know whose company or people is the irresponsible to make or to have an illegal access to secure or to control your business or the company,and destroy the trust of the costumer and also the supplier .The first thing that I will do is ask a help or hired an expert in computer or internet to easily to have a companion so that it will be fast to solve the problem.I will gonna anti hacking or blocking it so that it will be never control again by the hacker.The company must be aware about this thing or this internet crime but if the company will be not in security they might possible that they will be hacking again or the illegal access.