Monday, February 22, 2010

Key Provisions of the USA Patriot Act

Section 201 -- Gives federal officials the authority to
intercept wire, spoken and electronic communications
relating to terrorism.

Section 202 -- Gives federal officials the authority to
intercept wire, spoken and electronic communications
relating to computer fraud and abuse offenses.

Subsection 203(b) -- Permits the sharing of grand jury
information that involves foreign intelligence or
counterintelligence with federal law enforcement,
intelligence, protective,immigration, national
defense or national security officials.

Subsection 203(d) -- Gives foreign intelligence or
counterintelligence officers the ability to share
foreign intelligence information obtained as part
of a criminal investigation with law enforcement.

Section 204 -- Makes clear that nothing in the law
regarding pen registers -- an electronic device
which records all numbers dialed from a particular
phone line -- stops the government's ability to
obtain foreign intelligence information.

Section 206 -- Allows federal officials to issue roving
"John Doe" wiretaps, which allow investigators to
listen in on any telephone and tap any computer they
think a suspected spy or terrorist might use.

Section 207 -- Increases the amount of time that federal
officials may watch people they suspect are spies or
terrorists.

Section 209 -- Permits the seizure of voicemail messages
under a warrant.

Section 212 -- Permits Internet service providers and
other electronic communication and remote computing
service providers to hand over records and e-mails
to federal officials in emergency situations.

Section 214 -- Allows use of a pen register or trap and
trace devices that record originating phone numbers
of all incoming calls in international terrorism or
spy investigations.

Section 215 -- Authorizes federal officials to obtain
"tangible items" like business records, including
those from libraries and bookstores,for foreign
intelligence and international terrorism
investigations.

Section 217 -- Makes it lawful to intercept the wire or
electronic communication of a computer hacker or
intruder in certain circumstances.

Section 218 -- Allows federal officials to wiretap or
watch suspects if foreign intelligence gathering is
a "significant purpose" for seeking a Federal
Intelligence Surveillance Act order. The pre-Patriot
Act standard said officials could ask for the
surveillance only if it was the sole or main purpose.

Section 220 -- Provides for nationwide service of search
warrants for electronic evidence.

Section 223 -- Amends the federal criminal code to provide
for administrative discipline of federal officers or
employees who violate prohibitions against unauthorized
disclosures of information gathered under this act.

Section 225 -- Amends FISA to prohibit lawsuits against
people or companies that provide information to federal
officials for a terrorism investigation.



Source:(www.mail-archive.com/infowarrior@g2-forward.org/msg01814.html)

Saturday, February 6, 2010

Monday, January 25, 2010

♥♥♥What is privacy protection the law
what is privacy protection the law implementing and ensuring compliance with the Data Protection, influencing thinking on privacy and processing of personal information ... This reference guides you through the fragmented and conflicting environmental protection laws and regulations put into effect in recent ...
Posted by ♥♥John••Roye♥♥ at 9:17 PM 0 comments


'!♥♥what is privacy♥♥
When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear.In some countries individual privacy may conflict with freedom of speech laws and some laws may require public disclosure of information which would be considered private in other countries and cultures. Privacy may be voluntarily sacrificed, normally in exchange for perceived benefits and very often with specific dangers and losses, although this is a very strategic view of human relationships.
Posted by ♥♥John••Roye♥♥ at 8:32 PM 0 comments
Monday, January 11, 2010

The computer criminals and their object?
Computer criminals are characterized by using software,and search data on special computer crimes and their investigation .. Specific computer crimes cover infringements when computer system is an object of crime commitment. became necessary because new forms of computer crime posed a threat not only to the traditional objects of criminal law protection, ...
Posted by ♥♥John••Roye♥♥ at 10:21 PM 0 comments


....,.A Zero-Day Attack;.....
A zero-day attack is a virus or other exploit that is used to take advantage of a vulnerability in a computer application before a fix for the vulnerability ...In this sense, every new virus and variant of a malicious program is a "zero day attack" - malicious code that hasn't yet been analyzed in a lab. computer. See zero-day exploit. Computer Desktop Encyclopedia THIS DEFINITION IS FOR PERSONAL USE ONLY ...
Posted by ♥♥John••Roye♥♥ at 9:47 PM 0 comments

Monday, January 4, 2010

what would you do?
for me.....the IT security consultant to fix the security problem at a manufacturing company.....the last 8 months with three of the attacks making headlines for the negative.they have been given 90 days,All functional department that are involved in operation or production are integrated in one system,
Posted by ♥♥John••Roye♥♥ at 9:02 PM 0 comments

Monday, December 14, 2009

Presentation in a competitive work setting effective communication andpresentation skills can make a critical difference for success.hard work and good ideas.




Blog Archive
2010 (5)
January (5)
♥♥♥What is privacy protection the law
'!♥♥what is privacy♥♥
The computer criminals and their object?
....,.A Zero-Day Attack;.....
what would you do?
2009 (2)
December (2)
Presentation in a competitive work setting effecti...

About Me
♥♥John••Roye♥♥ View my complete profile