Monday, February 22, 2010

Key Provisions of the USA Patriot Act

Sixteen provisions of the USA patriot act are set to expire Dec.31 if not renewed.The senate voted Wednesday night to extent them six months. Still has to be approve by the house.

THE PROVISIONS ARE:
SECTION201-gives federal officials the authority to intercept wire spoken electric communication relating to terrorism.

SECTION 202-gives federal officials the authoriry to interceptwire spoken and electric communication relating to computer fraud and abuse offenses.

SECTION2039(b)-permits the sharing of grand jury information that involves foreign intelligence or counterintelligence officers the ability to share foreign intelligence information obtained apart of a criminal investigation.

SECTION204-makes clear that nothing in the law regarding pen register an electric device which records all numbers dialled from particular phone line.

SECTION 206-allows federal officials to issue loving "JOHN DOE"wiretaps which allows investigations to listen in on any telephone.

SECTION207-increases the amount of time that federal officials may watch people they suspect and spies orterrorists.

SECTION209-permits the seizure of voicemail messanges under a warrant.

SECTION212-permits internet service providers and other electronic communications and remote computing service providers to hand over records and emails.

SECTION214-allows use of a pen register or trap and trace devices that record originating phone numbers of all incoming calls in international terrorism.

SECTION215-authorizes federal officials to obtain"tangible items "like business records,including those from libraries and bookstores.

SECTION217-makes it lawful to intercept the wire or electric communication of a computer hacker in certain circumstances.

SECTION218-allows federal officials to wiretap if foreign intelligence gathering is a "significant purpose " for seeking a federal intellegence surveillance act order.

SECTION220-provides for nationwide service of search warrants for electric evidence .

SECTION223-amends the federal criminal code to provide for administrative discipline of federal officers or employees who violate prohibition against unauthorized disclosures of information.

SECTION225-amends FISA to prohibit lawsuits against people that provide information to federal official for a terrorism investigation.

SOURCE:www.mail.archieve.com/infovaerior@g2-forward.org

Monday, January 25, 2010

what is privacy protection?

This information has to be made publicly available to everyone via the public WHOIS database as required by ICANN, the international governing body for domain names. Everyday, this valuable source of accurate contact information is targeted and harvested by spammers and telemarketers resulting in unwanted and unsolicited contact. Also since your contact information is public, you are at risk for identity theft and fraud and of being contacted by harassers and stalkers.

Privacy Protection ensures that your private information is not published by replacing all your publicly visible contact details with alternate contact information.

What is computer privacy in the law?

Simply stated, courts in the United States tend to favor the employer in workplace-surveillance cases. For that reason, employees should always use good judgment when logging onto the Internet and sending e-mails. Choose your words carefully; you never know who might read your correspondence.

Under the Electronic Communications Privacy Act (ECPA), electronic communications are divided into two groups:

  • Stored communication
  • Communication in transit

Under­ the law, electronic communication in transit has almost the same level of protection as voice communication, meaning that intercepting it is prohibited. Accessing stored electronic communication, such as e-mail sitting on a server waiting to be sent, is not illegal. The courts have ruled that since the e-mail is not physically traveling anywhere -- is not "in transit" -- it does not have the same level of protection.

What is privacy?

Privacy (from Latin privatus 'separated from the rest, deprived of sth, esp. office, participation in the government', from privo 'to deprive') is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear.

SOURCE:www.wikipedia.com

Monday, January 18, 2010

who are the computer criminals and their object?

are mean and sinister type.But many more wear business suits,have university degrees,and appear to be pillars of their communities.

no single profile captures the characteristics of a typical computer criminal, and many who fit the profile are not criminals at all.

WHAT WOULD I SAY OR DO?

1) I will talk to my manager and co-worker that was an accident.Then I will check my IT SECURITY if it is correct and new,after that I will change my security system.

2) If my friends expert to that crimes in the COMPUTER COMPANY,I will tell the administration for that big problem.So that it will cure the virus,then I will do my best as a worker.

Zero-Day-Attack

= takes place before the security community or software developer knows about a vulnerability or has been able to repair it.