[iwar] [fc:What.the.DOJ.wants.to.fight.terrorism.-.in.terms.of.your.information]

From: Fred Cohen (fc@all.net)
Date: 2001-09-20 20:05:17


Return-Path: <sentto-279987-2120-1001041492-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 20 Sep 2001 20:07:09 -0700 (PDT)
Received: (qmail 10087 invoked by uid 510); 21 Sep 2001 03:05:40 -0000
Received: from n15.groups.yahoo.com (216.115.96.65) by 204.181.12.215 with SMTP; 21 Sep 2001 03:05:40 -0000
X-eGroups-Return: sentto-279987-2120-1001041492-fc=all.net@returns.onelist.com
Received: from [10.1.1.220] by ml.egroups.com with NNFMP; 21 Sep 2001 03:05:18 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 21 Sep 2001 03:04:52 -0000
Received: (qmail 36027 invoked from network); 21 Sep 2001 03:04:52 -0000
Received: from unknown (10.1.10.142) by 10.1.1.220 with QMQP; 21 Sep 2001 03:04:52 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 21 Sep 2001 03:05:18 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA05324 for iwar@onelist.com; Thu, 20 Sep 2001 20:05:17 -0700
Message-Id: <200109210305.UAA05324@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 20 Sep 2001 20:05:17 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:What.the.DOJ.wants.to.fight.terrorism.-.in.terms.of.your.information]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

· Obtain student records from colleges and schools; the government
said such information "could be important in the criminal investigation of
the terrorist attack" against New York and Washington.
· Give to the Central Intelligence Agency and others information
uncovered through grand jury subpoenas, such as records of a suspect's
telephones, computers and financial transactions. They also would allow the
State Department to disclose visa information to foreign governments.
· Extend secret surveillance of foreign spies and terrorists for up to
one year with a court's permission. Current limits are up to 90 days.
· Use a powerful 1978 anti-espionage law in investigations that aren't
primarily focused on spying.
· More easily obtain a judge's permission to determine who a spy or
terrorist may be calling or e-mailing.
· Collect DNA samples from people convicted of a wide range of
terrorist-type crimes.
· Use a single search warrant from a federal judge or magistrate to
obtain copies of e-mail anywhere in the United States. Current law requires
police to obtain warrants in the jurisdiction where the Internet provider is
located. The government said time saved by investigators would "further
public safety" in crimes where speed is important, such as kidnappings or
threats to public safety or the economy.
· Prosecute terrorists in court no matter how much time has passed
since an attack.
· Eavesdrop on terrorists or criminals who use cable-modem Internet
connections; the 1984 Cable Act, which limits types of subscriber
information cable companies can turn over, had raised questions about
whether that law also applied to Internet traffic over cable lines.
· Explicitly use information in U.S. criminal cases from wiretaps
placed by foreign governments, unless those wiretaps were set up in
violation of Constitutional protections with the "knowing participation" of
U.S. prosecutors.
· Obtain payment information, such as credit card numbers, from
communications companies, such as Internet providers. The government said
that, "remarkably," current laws allow police with a subpoena to obtain only
a suspect's name, billing address and details about their service.
· Monitor a company's computer networks, at the company's request, to
detect hackers. Attackers "can target critical infrastructure and engage in
cyberterrorism," the Justice Department said.
· Obtain subscriber records disclosed voluntarily by Internet
providers in "emergencies that threaten death or serious bodily injury."

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/JNm9_D/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:46 PDT