Quiz 5 Study Notes CSC111 :: Fall 2012

Size: px
Start display at page:

Download "Quiz 5 Study Notes CSC111 :: Fall 2012"

Transcription

1 Quiz 5 Study Notes CSC111 :: Fall 2012 Topics and Notes 1. October 19 th Full disk encryption Live capture reconsidered Possibly use data recovery mechanism Find user password UK law requires turnover of key; US 5 th amendment Key escrow controversy escrow =df a deed, a bond, money, or a piece of property held in trust by a third party to be turned over to the grantee only upon fulfillment of a condition. (Merriam-Webster) Gaining password If lucky in swap space, in RAM Brute force Password reset Dictionary attack Steganography Carrier file Payload Difficult to detect Tough, if not impossible, to extract payload 2. October 22 nd & 24 th Data destruction

2 Drive wiping quality of tool; skill of user Telltale marks of use, e.g., MRU Apple options zero out, 7-pass, 35-pass Bradly Manning case zero-filling Data remanence the residual representation of data that remains even after attempts have been made to remove or erase it. How counter overwriting, degaussing, encryption, physical destruction Defragmentation the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file. Defragmentation reduces data access time and allows storage to be used more efficiently. Some operating systems automatically defragment storage periodically; others require that the user occasionally use a special utility for this purpose. 2. October 26 th Sammons, chapter 7 legal isses Perpetual catch-up 4 th Amendment Issues: < probable cause < oath with place, person, things < expectation of privacy < does not cover search by private citizens Expectation of privacy

3 Individual files? 5 th vs. 10 th circuit Knowingly exposed info Protected enroute Not at destination Wiretap Act Electronic communication ECPA bans third party from intercepting, disclosing ECPA CALEA Patriot Act 2001, 2006 Virginia Governor case Alaska Governor case anticipatory obstruction of justice Warrantless searches Consent authorized person, (proven to be) truly voluntary, may be revoked at any time (except for clones); scope of consent? Consent forms Consent by 3 rd parties authorized person? Common area? Password protected? 1 st person present? Who spouses, sometimes parents, technicians courts are split Exigent circumstances 1 immanent threat of destruction 2 danger to law enforcement or public 3 prevent escape Plain view doctrine, if already in permitted area Separate crime separate warrant Border control greater latitude Workplace issues may or may not have expectation; gov t employees different 3. November 2 nd

4 Bill of Rights What first 10 amendments (+ mystery amendment) Why During the debates on the adoption of the Constitution, its opponents repeatedly charged that the Constitution as drafted would open the way to tyranny by the central government. Fresh in their minds was the memory of the British violation of civil rights before and during the Revolution. They demanded a "bill of rights" that would spell out the immunities of individual citizens. Several state conventions in their formal ratification of the Constitution asked for such amendments; others ratified the Constitution with the understanding that the amendments would be offered. In the ratification debate, Anti-Federalists opposed to the Constitution, complained that the new system threatened liberties, and suggested that if the delegates had truly cared about protecting individual rights, they would have included provisions that accomplished that. With ratification in serious doubt, Federalists announced a willingness to take up the matter of a series of amendments, to be called the Bill of Rights, soon after ratification and the First Congress comes into session. The concession was undoubtedly necessary to secure the Constitution's hard-fought ratification. Thomas Jefferson, who did not attend the Constitutional Convention, in a December 1787 letter to Madison called the omission of a Bill of Rights a major mistake: A bill of rights is what the people are entitled to against every government on earth. 4.

5 November 5 th Lessons from Cuckoo s Egg 1. Don t ignore minor glitches e.g., $.75 Comment: This set the hunt into motion 2. Tiny details can yield huge clues 1200 baud Comment: Points to dial-up line; i.e., outside the building e.g., ps axu vs. ps eafg Comment: Two flavors of Unix hints re location and/or background of suspect 3. Know the law! Comment: Need warrant to record? p. 17 Need warrant to trace phone line? p. 31 Where are warrants good? p. 57 CA no good in VA No need for a search warrant to trace phone call p Must have evidence p. 15 Comment: Why are you wasting my time? You don't know anything and you haven't proven a whit. Go back and find out. Show me proof. 5. If someone closes the door, look for a window p. 90 Comment: Phone company won t cooperate, try combinations of info you already have

6 6. Finding evidence is hard work e.g., setting up 50 monitors for 50 phone lines 7. To cut down search space, focus on anomalies 8. For surveillance must stay hidden p. 28 Comment: Watched Unix-4 & -5 from new machine, Unix-8. Created one-way moat. 1st thing hacker did was check system software for changes; would have seen that a program had been written to look for him. 9. If you don t write it down, it didn t happen p. 24 Comment: Review of notes later proved helpful. 10. Don t have too narrow a focus p. 47 Comment: Hacker used other accounts, not just Sventek s.

Cyber-law and Forensic Investigation Guideline

Cyber-law and Forensic Investigation Guideline CprE 592-YG Computer and Network Forensics Cyber-law and Forensic Investigation Guideline Yong Guan 3216 Coover Tel: (515) 294-8378 Email: guan@ee.iastate.edu September 23 & 25 & 30, 2003 2 Outline! Searching

More information

Electronic Privacy Information Center September 24, 2001

Electronic Privacy Information Center September 24, 2001 Electronic Privacy Information Center September 24, 2001 Analysis of Provisions of the Proposed Anti-Terrorism Act of 2001 Affecting the Privacy of Communications and Personal Information In response to

More information

The Supreme Court, Civil Liberties, and Civil Rights

The Supreme Court, Civil Liberties, and Civil Rights MIT OpenCourseWare http://ocw.mit.edu 17.245 The Supreme Court, Civil Liberties, and Civil Rights Fall 2006 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

More information

Case 3:15-cv WHA Document 31 Filed 03/03/16 Page 1 of 14 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA.

Case 3:15-cv WHA Document 31 Filed 03/03/16 Page 1 of 14 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA. Case :-cv-0-wha Document Filed 0/0/ Page of Brenna E. Erlbaum (SBN: 0 HEIT ERLBAUM, LLP 0-I South Reino Rd # Newbury Park, CA 0 [phone]: (0. Brenna.Erlbaum@HElaw.attorney Nicholas Ranallo, Attorney at

More information

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15 Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15-1 Applicability of chapter Sec. 1. Except as otherwise provided,

More information

DATA PROCESSING AGREEMENT. between [Customer] (the "Controller") and LINK Mobility (the "Processor")

DATA PROCESSING AGREEMENT. between [Customer] (the Controller) and LINK Mobility (the Processor) DATA PROCESSING AGREEMENT between [Customer] (the "Controller") and LINK Mobility (the "Processor") Controller Contact Information Name: Title: Address: Phone: Email: Processor Contact Information Name:

More information

(Straw) Man in the Middle:

(Straw) Man in the Middle: (Straw) Man in the Middle: A Modest Post-Snowden Proposal Brussels, Belgium Jacob Appelbaum [redacted] 10 December 2015 Jacob Appelbaum ([redacted]) (Straw) Man in the Middle: 10 December 2015 1 / 26 Post-Snowden?

More information

How did foreign policy during the Federalist Era deepen partisan divisions?

How did foreign policy during the Federalist Era deepen partisan divisions? How did foreign policy during the Federalist Era deepen partisan divisions? First Party System- Who would you have supported? Federalist Platform Strong Centralized Govt Democratic-Republican Platform

More information

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping Gina Stevens Legislative Attorney Charles Doyle Senior Specialist in American Public Law October 9,

More information

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org ELECTRONIC FRONTIER FOUNDATION Protecting Rights and Defending Freedom on the Electronic Frontier eff.org Know Your Rights Your computer, phone, and other digital devices hold vast amounts of personal

More information

CREATING A GOVERNMENT

CREATING A GOVERNMENT Let us not be afraid to view with a steady eye the dangers with which we are surrounded. Are we not on the eve of a war, which is only to be prevented by the hopes from this convention? CREATING A GOVERNMENT

More information

Protecting your IT infrastructure from Legal attacks: Subpoenas, Warrants and Transitive Attacks. Alexander Muentz, Esq. Defcon 15

Protecting your IT infrastructure from Legal attacks: Subpoenas, Warrants and Transitive Attacks. Alexander Muentz, Esq. Defcon 15 Protecting your IT infrastructure from Legal attacks: Subpoenas, Warrants and Transitive Attacks Alexander Muentz, Esq. Defcon 15 Disclaimer I am a lawyer, but not your lawyer The topics presented reflect

More information

Federalists and anti-federalists The power of subtleties

Federalists and anti-federalists The power of subtleties Federalists and anti-federalists The power of subtleties The ratification of the Constitution exemplifies the power of subtleties. The two sides in the debate, the Federalists and the Anti-federalists,

More information

Recording of Officers Increases Has Your Agency Set The Standards for Liability Protection? Let s face it; police officers do not like to be recorded, especially when performing their official duties in

More information

Fear of Online Crime: Americans support FBI interception of criminal suspects and new laws to protect online privacy

Fear of Online Crime: Americans support FBI interception of criminal suspects  and new laws to protect online privacy EMBARGOED FOR RELEASE AT 6:30 PM EASTERN MONDAY, APRIL 2, 2001 Fear of Online Crime: Americans support FBI interception of criminal suspects email and new laws to protect online privacy By Susannah Fox,

More information

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS JUNE 8, 2017 Bracewell LLP makes this information available for educational purposes. This information does not offer specific legal advice

More information

Chapter 33. (CalECPA)

Chapter 33. (CalECPA) Chapter 33 Electronic Communications and Records Searches (CalECPA) Generally The California Electronic Communications Privacy Act (CalECPA): CalECPA sets forth the means by which officers may obtain electronic

More information

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2 Chapter 20: Civil Liberties: Protecting Individual Rights Section 2 Objectives 1. Outline Supreme Court decisions regarding slavery and involuntary servitude. 2. Explain the intent and application of the

More information

CRIMINAL LAW AND PROCEDURE: AN UPDATE

CRIMINAL LAW AND PROCEDURE: AN UPDATE CRIMINAL LAW AND PROCEDURE: AN UPDATE OVERVIEW Fourth Amendment Sixth Amendment Confrontation Clause 1 Death Penalty Death Penalty: Kansas Cases Lethal Injection Kansas Cases Pleas and waivers Self-defense

More information

Encryption & FBI vs Apple. Sophie Park & Shanelle Roman

Encryption & FBI vs Apple. Sophie Park & Shanelle Roman Encryption & FBI vs Apple Sophie Park & Shanelle Roman Legal Issues in FBI vs. Apple Main Topics Technical Debates in Encryption and Security Social Interpretation and Responses Framing Question Consumer

More information

THE GOVERNMENT S POST-HEARING BRIEF

THE GOVERNMENT S POST-HEARING BRIEF Case 1:15-mc-01902-JO Document 21 Filed 10/28/15 Page 1 of 12 PageID #: 551 EMN:LHE/SK F.#2014R00236 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NEW YORK X IN RE ORDER REQUIRING APPLE INC. TO ASSIST

More information

TekSavvy Solutions Inc.

TekSavvy Solutions Inc. TekSavvy Solutions Inc. Law Enforcement Guide TekSavvy Solutions Inc. ( TekSavvy ) is a provider of Internet access, voice telephony, and related telecommunication services. We retain subscriber information

More information

Regulation of Interception of Act 18 Communications Act 2010

Regulation of Interception of Act 18 Communications Act 2010 ACTS SUPPLEMENT No. 7 3rd September, 2010. ACTS SUPPLEMENT to The Uganda Gazette No. 53 Volume CIII dated 3rd September, 2010. Printed by UPPC, Entebbe, by Order of the Government. Regulation of Interception

More information

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC CODE OF PRACTICE Preliminary draft code: This document is circulated by the Home Office in advance of enactment of the RIP Bill as an indication

More information

NII Ph.D : Online Application

NII Ph.D : Online Application NII Ph.D. 2018 : Online Application Terms and Conditions for Online Payment Gateway The Terms and Conditions contained herein shall apply to any person ('User') using the services of National Institute

More information

IC Chapter 5. Search and Seizure

IC Chapter 5. Search and Seizure IC 35-33-5 Chapter 5. Search and Seizure IC 35-33-5-0.1 Application of certain amendments to chapter Sec. 0.1. The amendments made to section 5 of this chapter by P.L.17-2001 apply to all actions of a

More information

Chapter 1: Computer Forensics and Investigations as a Profession

Chapter 1: Computer Forensics and Investigations as a Profession Chapter 1: Computer Forensics and Investigations as a Profession Download Full Test Bank for guide to computer forensics and investigations 5th edition at https://getbooksolutions.com/download/test-bank-for-guide-to-computer-forensics-andinvestigations-5th-edition

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS

GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS June 2017 Status: Approved Print Date: 6/29/2017 Page 1 of 18 Section 1: Introduction GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS The Election Act requires

More information

An Examination of Internet Privacy in the United States

An Examination of Internet Privacy in the United States Project Number: 123-456-789 An Examination of Internet Privacy in the United States An Interactive Qualifying Project Submitted to the Faculty of Worcester Polytechnic Institute in partial fulfillment

More information

Legal Standard for Disclosure of Cell-Site Information (CSI) and Geolocation Information

Legal Standard for Disclosure of Cell-Site Information (CSI) and Geolocation Information MEMORANDUM June 29, 2010 To: Senate Intelligence Committee Attention: John Dickas From: Gina Stevens, Legislative Attorney, x7-2581 Alison M. Smith, Legislative Attorney, x7-6054 Jordan Segall, Law Clerk,

More information

The Bill of Rights. Part One: Read the Expert Information and highlight the main ideas and supporting details.

The Bill of Rights. Part One: Read the Expert Information and highlight the main ideas and supporting details. The Bill of Rights Part One: Read the Expert Information and highlight the main ideas and supporting details. Expert Information: The Anti-Federalists strongly argued against the ratification of the Constitution

More information

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE September 12, 2013 Members of Congress have introduced a series of bills to amend the Foreign Intelligence Surveillance Act in response to disclosure

More information

Crimes Act authorisation : this definition was inserted, as from 13 July 2011, by s 4(2) Crimes Amendment Act 2011 (2011 No 29).

Crimes Act authorisation : this definition was inserted, as from 13 July 2011, by s 4(2) Crimes Amendment Act 2011 (2011 No 29). Statutes of New Zealand [248 Interpretation Crimes Act 1961 For the purposes of this section and [[sections 249to252]], access, in relation to any computer system, means instruct, communicate with, store

More information

Case 9:18-mj BER Document 2 Entered on FLSD Docket 11/30/2018 Page 1 of 13

Case 9:18-mj BER Document 2 Entered on FLSD Docket 11/30/2018 Page 1 of 13 Case 9:18-mj-08461-BER Document 2 Entered on FLSD Docket 11/30/2018 Page 1 of 13 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA Case No. 18-8461-BER IN RE: APPLICATION OF THE UNITED STATES OF

More information

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early

More information

Debating the Constitution

Debating the Constitution SECTION 3 A Bill of Rights A bill of rights is what the people are entitled to against every government on earth, general or particular; and what no just government should refuse or rest on inference.

More information

The National Security Agency s Warrantless Wiretaps

The National Security Agency s Warrantless Wiretaps The National Security Agency s Warrantless Wiretaps In 2005, the press revealed that President George W. Bush had authorized government wiretaps without a court warrant of U.S. citizens suspected of terrorist

More information

Workplace Surveillance Act 2005

Workplace Surveillance Act 2005 Workplace Surveillance Act 2005 As at 20 May 2014 Long Title An Act to regulate surveillance of employees at work; and for other purposes. Part 1 ñ Preliminary 1 Name of Act This Act is the Workplace Surveillance

More information

Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms

Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms By: Jacob Trombley All Canadian citizens have the right to be secure against unreasonable

More information

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: APPENDIX THE EQUIPMENT INTERFERENCE REGIME 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: (a) (b) (c) (d) the Intelligence

More information

1791: The Bill of Rights

1791: The Bill of Rights Article from SIRS Discoverer Database; (ProQuest) Lexile:1380L NEW YORK TIMES UPFRONT Oct. 9, 2006, Vol. 139, No. 3, pp. 24+ Copyright Scholastic Inc. Oct. 9, 2006. All rights reserved. Reprinted with

More information

Suppose you disagreed with a new law.

Suppose you disagreed with a new law. Suppose you disagreed with a new law. You could write letters to newspapers voicing your opinion. You could demonstrate. You could contact your mayor or governor. You could even write a letter to the President.

More information

REGULATORY AGENCIES DO NOT NEED ADDITIONAL AUTHORITY TO ACCESS STORED COMMUNICATIONS

REGULATORY AGENCIES DO NOT NEED ADDITIONAL AUTHORITY TO ACCESS STORED COMMUNICATIONS REGULATORY AGENCIES DO NOT NEED ADDITIONAL AUTHORITY TO ACCESS STORED COMMUNICATIONS May 30, 2013 S. 607, the Leahy-Lee bill, would amend the Electronic Communications Privacy Act (ECPA) to require government

More information

The Constitutional Convention. Chapter 2 Section 4

The Constitutional Convention. Chapter 2 Section 4 The Constitutional Convention Chapter 2 Section 4 Constitutional Convention May 1787 Philadelphia, Pennsylvania 74 delegates allowed, 55 attended, 39 signed final Delegates to the Convention Had lots of

More information

Revolution to New Nation

Revolution to New Nation Revolution to New Nation Committee appointed to draft this constitution before the Declaration of Independence Adopted by Congress 1777 Finally ratified by all 13 states in 1781 Conflict between land-rich

More information

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter Ensure that you don t go from investigator to investigated Categories of law: Stalking, online harassment & cyberstalking

More information

Computer Search and Seizure

Computer Search and Seizure Computer Search and Seizure National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.ncjrl.org Funding! This project is supported by grants

More information

HEARING ON ELECTRONIC COMMUNICATIONS PRIVACY ACT REFORM

HEARING ON ELECTRONIC COMMUNICATIONS PRIVACY ACT REFORM Before the Committee on the Judiciary Subcommittee on the Constitution, Civil Rights, and Civil Liberties B353 Rayburn House Office Building Washington, D.C. 20515 HEARING ON ELECTRONIC COMMUNICATIONS

More information

A MODEL ACT FOR REGULATING THE USE OF WEARABLE BODY CAMERAS BY LAW ENFORCEMENT

A MODEL ACT FOR REGULATING THE USE OF WEARABLE BODY CAMERAS BY LAW ENFORCEMENT A MODEL ACT FOR REGULATING THE USE OF WEARABLE BODY CAMERAS BY LAW ENFORCEMENT Using this document 1. This Model Act recognizes that the costs associated with the use of body worn cameras will be extensive

More information

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on Written Testimony of Marc J. Zwillinger Founder ZwillGen PLLC United States Senate Committee on the Judiciary Hearing on Strengthening Privacy Rights and National Security: Oversight of FISA Surveillance

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Electronic Surveillance and FISA Eric Rosenbach and Aki J. Peritz Electronic Surveillance and FISA Electronic surveillance is one

More information

Terms and Conditions For Online-Payments

Terms and Conditions For Online-Payments Terms and Conditions For Online-Payments The Terms and Conditions contained herein shall apply to any person ( User ) using the services of Kulgaon Badlapur Municipal Council. ( KBMC ) for making Tender

More information

MEDICAL MARIJUANA REGULATORY PERMIT APPLICATION NEW APPLICATION ONLY

MEDICAL MARIJUANA REGULATORY PERMIT APPLICATION NEW APPLICATION ONLY For Official City Use ONLY Date Stamp Office of the City Manager 555 Santa Clara Street Vallejo CA 94590 707.648.4576 MEDICAL MARIJUANA REGULATORY PERMIT APPLICATION NEW APPLICATION ONLY The purpose of

More information

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF HOW COMPANIES ENGAGED IN TRANSPARENCY REPORTING CATEGORIZE & DEFINE U.S. GOVERNMENT LEGAL PROCESSES DEMANDING USER DATA, AND IDENTIFICATION

More information

L9. Electronic Voting

L9. Electronic Voting L9. Electronic Voting Alice E. Fischer October 2, 2018 Voting... 1/27 Public Policy Voting Basics On-Site vs. Off-site Voting Voting... 2/27 Voting is a Public Policy Concern Voting... 3/27 Public elections

More information

AKS M 49 C 30 a-d D 32 a-c D 33 a-c D 34 a-b BUILDING A NEW NATION

AKS M 49 C 30 a-d D 32 a-c D 33 a-c D 34 a-b BUILDING A NEW NATION AKS M 49 C 30 a-d D 32 a-c D 33 a-c D 34 a-b BUILDING A NEW NATION The official end of the Revolutionary War was the signing of the Treaty of Paris in 1783. The newly independent US and GA now faced the

More information

Petitioner, Respondent.

Petitioner, Respondent. No. 16-6761 IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, Petitioner, vs. UNITED STATES OF AMERICA, Respondent. PETITIONER S REPLY BRIEF HANNAH VALDEZ GARST Law Offices of Hannah Garst 121 S.

More information

Terms and Conditions for Online Payments

Terms and Conditions for Online Payments Terms and Conditions for Online Payments The Terms and Conditions contained herein shall apply to any person ( User ) using the services of Hero FinCorp Ltd. for making online payments through an online

More information

Rights of the Accused

Rights of the Accused A. Justification Rights of the Accused 1.Fear of unchecked governmental power / innocent until proven guilty 2. Suspects are citizens and thus have rights 3. Better to free a guilty person than to jail

More information

A Basic Overview of The Privacy Act of 1974

A Basic Overview of The Privacy Act of 1974 A Basic Overview of The Privacy Act of 1974 Denver, CO June 17, 2015 Presented by: Michael E. Reheuser Department of Defense What are today s goals? Gain a basic understanding of: The Privacy Act Compliance

More information

3: A New Plan of Government. Essential Question: How Do Governments Change?

3: A New Plan of Government. Essential Question: How Do Governments Change? 3: A New Plan of Government Essential Question: How Do Governments Change? The Constitution s Source Guiding Question: From where did the Framers of the Constitution borrow their ideas about government?

More information

The Bill of Rights to the United States Constitution. What does the term amend mean?

The Bill of Rights to the United States Constitution. What does the term amend mean? The Bill of Rights to the United States Constitution What does the term amend mean? The Bill of Rights First ten amendments to the United States Constitution Introduced by James Madison to the First United

More information

Plain View & Consent. Other Search and Seizure Issues Likely to Arise in Digital Child Pornography Cases. Objectives

Plain View & Consent. Other Search and Seizure Issues Likely to Arise in Digital Child Pornography Cases. Objectives Other Search and Seizure Issues Likely to Arise in Digital Child Pornography Cases 1 Plain View & Consent Priscilla M. Grantham Sr. Research Counsel Nat l Center for Justice and the Rule of Law Objectives

More information

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further

More information

PATRIOT Propaganda: Justice Department s PATRIOT Act Website Creates New Myths About Controversial Law. ACLU Analysis

PATRIOT Propaganda: Justice Department s PATRIOT Act Website Creates New Myths About Controversial Law. ACLU Analysis PATRIOT Propaganda: Justice Department s PATRIOT Act Website Creates New Myths About Controversial Law ACLU Analysis A new Justice Department website purporting to dispel the myths about the controversial

More information

Frequently Asked Questions about PNR data and the proposed EU-US agreement on US government access to PNR data from the EU

Frequently Asked Questions about PNR data and the proposed EU-US agreement on US government access to PNR data from the EU Frequently Asked Questions about PNR data and the proposed EU-US agreement on US government access to PNR data from the EU What's a PNR? A PNR ( Passenger Name Record ) is a record in a database of travel

More information

United States District Court,District of Columbia.

United States District Court,District of Columbia. United States District Court,District of Columbia. In the Matter of the Application of the UNITED STATES OF AMERICA FOR AN ORDER AUTHORIZING THE RELEASE OF PROSPECTIVE CELL SITE INFORMATION No. MISC.NO.05-508

More information

Agreement for iseries and AS/400 System Restore Test Service

Agreement for iseries and AS/400 System Restore Test Service Agreement for iseries and AS/400 System Restore Test Service 1. Introduction The iseries and AS/400 System Restore Test Service (called "the Service"). The Service is provided to you, as a registered subscriber

More information

THE FOREIGN EXCHANGE ACT, ARRANGEMENT OF SECTIONS

THE FOREIGN EXCHANGE ACT, ARRANGEMENT OF SECTIONS THE FOREIGN EXCHANGE ACT, 2004. ARRANGEMENT OF SECTIONS Section. 1. Short title. PART I PRELIMINARY. 2. Commencement. 3. Interpretation. 4. Authority of Bank of Uganda. 5. Licensing. PART II AUTHORITY

More information

Reauthorization of the FISA Amendments Act

Reauthorization of the FISA Amendments Act Edward C. Liu Legislative Attorney April 8, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42725 Summary On December 30,

More information

Civics EOC. Assembled by the Citrus County Research & Accountability Department

Civics EOC. Assembled by the Citrus County Research & Accountability Department Civics EOC All 35 of the questions on this Civics EOC are from the Florida Civics EOC Test Item Specifications. An electronic copy of the Item Specifications can be found at http://fcat.fldoe.org/eoc/pdf/fl12spiscivicswtr2g.pdf

More information

The United States Constitution. The Supreme Law of the Land

The United States Constitution. The Supreme Law of the Land The United States Constitution The Supreme Law of the Land The Articles Prove Unstable Federal gov t could declare war and other foreign affairs Federal gov t have no power to collect taxes, relying only

More information

Considerations on the use of technical surveillance in criminal proceedings

Considerations on the use of technical surveillance in criminal proceedings Considerations on the use of technical surveillance in criminal proceedings, Ph.D,,Alexandru Ioan Cuza Police Academy, Bucharest stancuserb@yahoo.ro, Ph.D Police Inspectorate of Brasov County, Romania,

More information

Section Three The Ratification Process: Federalists, Anti-Federalists, The Federalist Papers, and the Bill of Rights. Mr. Mullins

Section Three The Ratification Process: Federalists, Anti-Federalists, The Federalist Papers, and the Bill of Rights. Mr. Mullins Section Three The Ratification Process: Federalists, Anti-Federalists, The Federalist Papers, and the Bill of Rights Mr. Mullins Section Three Summary By the end of this section you will Understand why

More information

Cell Site Simulator Privacy Model Bill

Cell Site Simulator Privacy Model Bill Cell Site Simulator Privacy Model Bill SECTION 1. Definitions. As used in this Act: (A) Authorized possessor shall mean the person in possession of a communications device when that person is the owner

More information

Calif. Privacy Act Will Increase Data Breach Liability

Calif. Privacy Act Will Increase Data Breach Liability Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Calif. Privacy Act Will Increase Data Breach

More information

Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features: Satya Narayan, Attorney, Royse Law Firm, Palo Alto, Calif.

Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features: Satya Narayan, Attorney, Royse Law Firm, Palo Alto, Calif. Presenting a live 90-minute webinar with interactive Q&A Drafting Nondisclosure Agreements for Information Technology Transactions Negotiating Key Provisions and Exclusions, Navigating Challenges for Information

More information

Divided Supreme Court Requires Warrants for Cell Phone Location Data

Divided Supreme Court Requires Warrants for Cell Phone Location Data Divided Supreme Court Requires Warrants for Cell Phone Location Data July 2, 2018 On June 22, 2018, the United States Supreme Court decided Carpenter v. United States, in which it held that the government

More information

STATE OF MICHIGAN COURT OF APPEALS

STATE OF MICHIGAN COURT OF APPEALS STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellee, FOR PUBLICATION August 16, 2016 9:00 a.m. v No. 327289 Kent Circuit Court LORENZO ENRIQUE VENTURA, LC No. 14-004661-FH

More information

The American Revolution is over but now the colonists have to decide how they want to frame their government. Take the first 5 minutes of class and

The American Revolution is over but now the colonists have to decide how they want to frame their government. Take the first 5 minutes of class and The American Revolution is over but now the colonists have to decide how they want to frame their government. Take the first 5 minutes of class and imagine that you were a colonist that just fought against

More information

From Revolution to Government

From Revolution to Government From Revolution to Government The Second Continental Congress declared independence from Britain in 1776. The Revolutionary War lasted from 1775 to 1783. Congress developed a new government for America:

More information

7.5 NOTES George Washington ( )

7.5 NOTES George Washington ( ) 7.5 NOTES George Washington (1789-1797) I. Precedents A. examples that later people will follow B. EVERYTHING Washington Did set a precedent C. Examples: 1. cabinet 2. 2 terms 3. acted royally II. Cabinet

More information

Anton End User Agreement ( Agreement ) Ver. 1.4, 10/20/2016

Anton End User Agreement ( Agreement ) Ver. 1.4, 10/20/2016 Anton End User Agreement ( Agreement ) Ver. 1.4, 10/20/2016 Your signature on this document serves as acknowledgement that you have read and understand your responsibilities as a User and hereby agree

More information

REQUESTS FOR MUTUAL LEGAL ASSISTANCE IN CRIMINAL MATTERS. Guidance for Authorities Outside of Kenya

REQUESTS FOR MUTUAL LEGAL ASSISTANCE IN CRIMINAL MATTERS. Guidance for Authorities Outside of Kenya REPUBLIC OF KENYA REQUESTS FOR MUTUAL LEGAL ASSISTANCE IN CRIMINAL MATTERS Guidance for Authorities Outside of Kenya Issued by the Office of the Attorney General and Department of Justice, Sheria House,

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21704 Updated June 29, 2005 CRS Report for Congress Received through the CRS Web Summary USA PATRIOT Act Sunset: A Sketch Charles Doyle Senior Specialist American Law Division Several sections

More information

JUDICIAL BRANCH DEEP DIVE!

JUDICIAL BRANCH DEEP DIVE! JUDICIAL BRANCH DEEP DIVE! Mini Review Stack the following courts with the trial court on the bottom and the highest court on the top: Court of Appeals Supreme Court District Court Mini Review Stack the

More information

Marking Carnivore's Territory: Rethinking Pen Registers on the Internet

Marking Carnivore's Territory: Rethinking Pen Registers on the Internet Michigan Telecommunications and Technology Law Review Volume 8 Issue 1 2002 Marking Carnivore's Territory: Rethinking Pen Registers on the Internet Anthony E. Orr University of Michigan Law School Follow

More information

SaaS Software Escrow Agreement [Agreement Number EL ]

SaaS Software Escrow Agreement [Agreement Number EL ] SaaS Software Escrow Agreement [Agreement Number EL ] This Escrow Agreement ( Agreement ) is made on [INSERT DATE] by and among: 1) [Depositor Name, registered company number ######] located at [registered

More information

traditional exceptions to warrant requirement

traditional exceptions to warrant requirement traditional exceptions to warrant requirement National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.ncjrl.org materials 1. powerpoints 2.

More information

Quarter One: Unit Three

Quarter One: Unit Three ****At the end of this lesson, I will be able to do the following: SS.7.C.1.3- SS.7.C.1.3 and SS.7.C.1.4 Declaration of Independence trace the causal relationships between English/British policies, English

More information

Ratifying the Constitution

Ratifying the Constitution Ratifying the Constitution Federalists Favored the Constitution and strong centralized government Washington, Hamilton, Madison Felt the Constitution should be approved despite flaws Wrote The Federalists

More information

Was the Constitutional Convention a coup d etat?

Was the Constitutional Convention a coup d etat? Was the Constitutional Convention a coup d etat? The Federal Convention ( known now as the Constitutional Convention ) is understood by most Americans as the historic meeting place of the most patriotic

More information

Policies and Procedures No. 56

Policies and Procedures No. 56 1255 Imperial Avenue, Suite 1000 San Diego, CA 92101-7490 619/231-1466 FAX 619/234-3407 Policies and Procedures No. 56 SUBJECT: Enacted: 9/13/07 FRAUD IN THE WORKPLACE PURPOSE: To establish policies and

More information

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned Page 1 of 5 URL: http://www.aclu.org/safeandfree/safeandfree.cfm?id=13356&c=206 The Five Problems With CAPPS II August 25, 2003 The new version of CAPPS II is all dressed up in the language of privacy

More information

The Relationship between Britain and its American Colonies Changes

The Relationship between Britain and its American Colonies Changes Packet 3: Page 1 The Relationship between Britain and its American Colonies Changes What were the differing interests of the colonial regions? How and why did the relationship between Britain and the colonies

More information

3. Popular sovereignty - Rule by the people - People give their consent to be governed by government officials - People have the right to revolution

3. Popular sovereignty - Rule by the people - People give their consent to be governed by government officials - People have the right to revolution Unit I Notes Purposes of Government - Maintain social order - Provide public services - Provide security and defense - Provide for the economy - Governments get authority from: o Their legitimacy o Ability

More information

3121. General prohibition on pen register and trap and trace device use; exception

3121. General prohibition on pen register and trap and trace device use; exception UNITED STATES CODE ANNOTATED TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART II--CRIMINAL PROCEDURE CHAPTER 206--PEN REGISTERS AND TRAP AND TRACE DEVICES 3121. General prohibition on pen register and trap

More information

Case 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8

Case 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8 Case 1:16-cr-00169-WHP Document 125 Filed 07/18/17 Page 1 of 8 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ------------------------------------------------------------X UNITED STATES OF

More information

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. TPCA Best Practices Recognition Program Reference Searches Without a Warrant

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. TPCA Best Practices Recognition Program Reference Searches Without a Warrant Effective Date February 1, 2008 Reference Amended Date Distribution All Personnel City Manager City Attorney TPCA Best Practices Recognition Program Reference Review Date January 1, 2012 Pages 5 This Operations

More information