Quiz 5 Study Notes CSC111 :: Fall 2012

Similar documents
Cyber-law and Forensic Investigation Guideline

Electronic Privacy Information Center September 24, 2001

The Supreme Court, Civil Liberties, and Civil Rights

Case 3:15-cv WHA Document 31 Filed 03/03/16 Page 1 of 14 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA.

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

DATA PROCESSING AGREEMENT. between [Customer] (the "Controller") and LINK Mobility (the "Processor")

(Straw) Man in the Middle:

How did foreign policy during the Federalist Era deepen partisan divisions?

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org

CREATING A GOVERNMENT

Protecting your IT infrastructure from Legal attacks: Subpoenas, Warrants and Transitive Attacks. Alexander Muentz, Esq. Defcon 15

Federalists and anti-federalists The power of subtleties


Fear of Online Crime: Americans support FBI interception of criminal suspects and new laws to protect online privacy

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS

Chapter 33. (CalECPA)

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2

CRIMINAL LAW AND PROCEDURE: AN UPDATE

Encryption & FBI vs Apple. Sophie Park & Shanelle Roman

THE GOVERNMENT S POST-HEARING BRIEF

TekSavvy Solutions Inc.

Regulation of Interception of Act 18 Communications Act 2010

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

NII Ph.D : Online Application

IC Chapter 5. Search and Seizure

Chapter 1: Computer Forensics and Investigations as a Profession

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS

An Examination of Internet Privacy in the United States

Legal Standard for Disclosure of Cell-Site Information (CSI) and Geolocation Information

The Bill of Rights. Part One: Read the Expert Information and highlight the main ideas and supporting details.

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE

Crimes Act authorisation : this definition was inserted, as from 13 July 2011, by s 4(2) Crimes Amendment Act 2011 (2011 No 29).

Case 9:18-mj BER Document 2 Entered on FLSD Docket 11/30/2018 Page 1 of 13

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

Debating the Constitution

The National Security Agency s Warrantless Wiretaps

Workplace Surveillance Act 2005

Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

1791: The Bill of Rights

Suppose you disagreed with a new law.

REGULATORY AGENCIES DO NOT NEED ADDITIONAL AUTHORITY TO ACCESS STORED COMMUNICATIONS

The Constitutional Convention. Chapter 2 Section 4

Revolution to New Nation

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter

Computer Search and Seizure

HEARING ON ELECTRONIC COMMUNICATIONS PRIVACY ACT REFORM

A MODEL ACT FOR REGULATING THE USE OF WEARABLE BODY CAMERAS BY LAW ENFORCEMENT

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on

Confrontation or Collaboration?

Terms and Conditions For Online-Payments

MEDICAL MARIJUANA REGULATORY PERMIT APPLICATION NEW APPLICATION ONLY

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF

L9. Electronic Voting

AKS M 49 C 30 a-d D 32 a-c D 33 a-c D 34 a-b BUILDING A NEW NATION

Petitioner, Respondent.

Terms and Conditions for Online Payments

Rights of the Accused

A Basic Overview of The Privacy Act of 1974

3: A New Plan of Government. Essential Question: How Do Governments Change?

The Bill of Rights to the United States Constitution. What does the term amend mean?

Plain View & Consent. Other Search and Seizure Issues Likely to Arise in Digital Child Pornography Cases. Objectives

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

PATRIOT Propaganda: Justice Department s PATRIOT Act Website Creates New Myths About Controversial Law. ACLU Analysis

Frequently Asked Questions about PNR data and the proposed EU-US agreement on US government access to PNR data from the EU

United States District Court,District of Columbia.

Agreement for iseries and AS/400 System Restore Test Service

THE FOREIGN EXCHANGE ACT, ARRANGEMENT OF SECTIONS

Reauthorization of the FISA Amendments Act

Civics EOC. Assembled by the Citrus County Research & Accountability Department

The United States Constitution. The Supreme Law of the Land

Considerations on the use of technical surveillance in criminal proceedings

Section Three The Ratification Process: Federalists, Anti-Federalists, The Federalist Papers, and the Bill of Rights. Mr. Mullins

Cell Site Simulator Privacy Model Bill

Calif. Privacy Act Will Increase Data Breach Liability

Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features: Satya Narayan, Attorney, Royse Law Firm, Palo Alto, Calif.

Divided Supreme Court Requires Warrants for Cell Phone Location Data

STATE OF MICHIGAN COURT OF APPEALS

The American Revolution is over but now the colonists have to decide how they want to frame their government. Take the first 5 minutes of class and

From Revolution to Government

7.5 NOTES George Washington ( )

Anton End User Agreement ( Agreement ) Ver. 1.4, 10/20/2016

REQUESTS FOR MUTUAL LEGAL ASSISTANCE IN CRIMINAL MATTERS. Guidance for Authorities Outside of Kenya

CRS Report for Congress

JUDICIAL BRANCH DEEP DIVE!

Marking Carnivore's Territory: Rethinking Pen Registers on the Internet

SaaS Software Escrow Agreement [Agreement Number EL ]

traditional exceptions to warrant requirement

Quarter One: Unit Three

Ratifying the Constitution

Was the Constitutional Convention a coup d etat?

Policies and Procedures No. 56

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned

The Relationship between Britain and its American Colonies Changes

3. Popular sovereignty - Rule by the people - People give their consent to be governed by government officials - People have the right to revolution

3121. General prohibition on pen register and trap and trace device use; exception

Case 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. TPCA Best Practices Recognition Program Reference Searches Without a Warrant

Transcription:

Quiz 5 Study Notes CSC111 :: Fall 2012 Topics and Notes 1. October 19 th Full disk encryption Live capture reconsidered Possibly use data recovery mechanism Find user password UK law requires turnover of key; US 5 th amendment Key escrow controversy escrow =df a deed, a bond, money, or a piece of property held in trust by a third party to be turned over to the grantee only upon fulfillment of a condition. (Merriam-Webster) Gaining password If lucky in swap space, in RAM Brute force Password reset Dictionary attack Steganography Carrier file Payload Difficult to detect Tough, if not impossible, to extract payload 2. October 22 nd & 24 th Data destruction

Drive wiping quality of tool; skill of user Telltale marks of use, e.g., MRU Apple options zero out, 7-pass, 35-pass Bradly Manning case zero-filling Data remanence the residual representation of data that remains even after attempts have been made to remove or erase it. How counter overwriting, degaussing, encryption, physical destruction Defragmentation the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file. Defragmentation reduces data access time and allows storage to be used more efficiently. Some operating systems automatically defragment storage periodically; others require that the user occasionally use a special utility for this purpose. 2. October 26 th Sammons, chapter 7 legal isses Perpetual catch-up 4 th Amendment Issues: < probable cause < oath with place, person, things < expectation of privacy < does not cover search by private citizens Expectation of privacy

Individual files? 5 th vs. 10 th circuit Knowingly exposed info Email Protected enroute Not at destination Wiretap Act Electronic communication ECPA bans third party from intercepting, disclosing ECPA CALEA Patriot Act 2001, 2006 Virginia Governor case Alaska Governor case anticipatory obstruction of justice Warrantless searches Consent authorized person, (proven to be) truly voluntary, may be revoked at any time (except for clones); scope of consent? Consent forms Consent by 3 rd parties authorized person? Common area? Password protected? 1 st person present? Who spouses, sometimes parents, technicians courts are split Exigent circumstances 1 immanent threat of destruction 2 danger to law enforcement or public 3 prevent escape Plain view doctrine, if already in permitted area Separate crime separate warrant Border control greater latitude Workplace issues may or may not have expectation; gov t employees different 3. November 2 nd

Bill of Rights What first 10 amendments (+ mystery amendment) Why During the debates on the adoption of the Constitution, its opponents repeatedly charged that the Constitution as drafted would open the way to tyranny by the central government. Fresh in their minds was the memory of the British violation of civil rights before and during the Revolution. They demanded a "bill of rights" that would spell out the immunities of individual citizens. Several state conventions in their formal ratification of the Constitution asked for such amendments; others ratified the Constitution with the understanding that the amendments would be offered. In the ratification debate, Anti-Federalists opposed to the Constitution, complained that the new system threatened liberties, and suggested that if the delegates had truly cared about protecting individual rights, they would have included provisions that accomplished that. With ratification in serious doubt, Federalists announced a willingness to take up the matter of a series of amendments, to be called the Bill of Rights, soon after ratification and the First Congress comes into session. The concession was undoubtedly necessary to secure the Constitution's hard-fought ratification. Thomas Jefferson, who did not attend the Constitutional Convention, in a December 1787 letter to Madison called the omission of a Bill of Rights a major mistake: A bill of rights is what the people are entitled to against every government on earth. 4.

November 5 th Lessons from Cuckoo s Egg 1. Don t ignore minor glitches e.g., $.75 Comment: This set the hunt into motion 2. Tiny details can yield huge clues 1200 baud Comment: Points to dial-up line; i.e., outside the building e.g., ps axu vs. ps eafg Comment: Two flavors of Unix hints re location and/or background of suspect 3. Know the law! Comment: Need warrant to record? p. 17 Need warrant to trace phone line? p. 31 Where are warrants good? p. 57 CA no good in VA No need for a search warrant to trace phone call p. 89 4. Must have evidence p. 15 Comment: Why are you wasting my time? You don't know anything and you haven't proven a whit. Go back and find out. Show me proof. 5. If someone closes the door, look for a window p. 90 Comment: Phone company won t cooperate, try combinations of info you already have

6. Finding evidence is hard work e.g., setting up 50 monitors for 50 phone lines 7. To cut down search space, focus on anomalies 8. For surveillance must stay hidden p. 28 Comment: Watched Unix-4 & -5 from new machine, Unix-8. Created one-way moat. 1st thing hacker did was check system software for changes; would have seen that a program had been written to look for him. 9. If you don t write it down, it didn t happen p. 24 Comment: Review of notes later proved helpful. 10. Don t have too narrow a focus p. 47 Comment: Hacker used other accounts, not just Sventek s.