Electronic Communications Privacy Act of 2000, Digital Privacy Act of 2000, and Notice of Electronic Monitoring Act: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, on H.R. 5018, H.R. 4987, and H.R. 4908, September 6, 2000

Couverture

À l'intérieur du livre

Pages sélectionnées

Autres éditions - Tout afficher

Expressions et termes fréquents

Fréquemment cités

Page 5 - McCxiN introduced the following bill; which was referred to the Committee on the Judiciary A BILL To amend title 18, United States Code, with respect to offenses relating to the sexual exploitation of children, and for other purposes.
Page 3 - ... during the preceding calendar year. Such report shall include a summary and analysis of the data required to be filed with the Administrative Office by subsections (1) and (2) of this section. The Director of the Administrative Office of the United States Courts is authorized to issue binding regulations dealing with the content and form of the reports required to be filed by subsections (1) and (2) of this section.
Page 2 - ... (e) the offense specified in the order or application, or extension of an order; (f) the identity of the applying investigative or law enforcement officer and agency making the application and the person authorizing the application; and (g) the nature of the facilities from which or the place -where communications were to be intercepted.
Page 60 - ... the information likely to be obtained is relevant to an ongoing criminal investigation being conducted by that agency.
Page 2 - ... (2) In January of each year the Attorney General, an Assistant Attorney General specially designated by the Attorney General, or the principal prosecuting attorney of a State, or the principal prosecuting attorney for any political subdivision of a State, shall report to the Administrative Office of the United States...
Page 33 - In one example, convicted terrorist Ramzi Yousef, the mastermind of the World Trade Center bombing, stored detailed plans to destroy United States airliners on encrypted files on his laptop computer. While we have not yet seen these groups employ cyber tools as a weapon to use against critical infrastructures, their reliance on information technology and acquisition of computer expertise are clear warning signs.
Page 33 - Achilles heel— our growing dependence on information technology in government and commercial operations. For example, two Chinese military officers recently published a book that called for the use of unconventional measures, including the propagation of computer viruses, to counterbalance the military power of the United States. A Russian official has also commented that an attack on a national infrastructure could, "by virtue of its catastrophic consequences, completely overlap with the use of...
Page 54 - Before the Subcomm. on Civil and Constitutional Rights of the House Comm. on the Judiciary, 102d Cong., 2d Sess.
Page 3 - ... (f) the number of convictions resulting from such interceptions and the offenses for which the convictions were obtained and a general assessment of the importance of the interceptions; and...
Page 3 - ... finds that the attorney for the Government or the State law enforcement or investigative officer has certified to the court that the information likely to be obtained by such installation and use is relevant to an ongoing criminal investigation.

Informations bibliographiques