Electronic Communications Privacy Act of 2000, Digital Privacy Act of 2000, and Notice of Electronic Monitoring Act: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, on H.R. 5018, H.R. 4987, and H.R. 4908, September 6, 2000

Couverture

À l'intérieur du livre

Autres éditions - Tout afficher

Expressions et termes fréquents

Fréquemment cités

Page 3 - ... during the preceding calendar year. Such report shall include a summary and analysis of the data required to be filed with the Administrative Office by subsections (1) and (2) of this section. The Director of the Administrative Office of the United States Courts is authorized to issue binding regulations dealing with the content and form of the reports required: to be filed by subsections (1) and (2) of this section.
Page 2 - McCxiN introduced the following bill; which was referred to the Committee on the Judiciary A BILL To amend title 18, United States Code, with respect to offenses relating to the sexual exploitation of children, and for other purposes.
Page 2 - Courts: (1) the fact that an order or extension was applied for; (2) the kind of order or extension applied for; (3) the fact that the order or extension was granted as applied for, was modified, or was denied; (4) the period of interceptions authorized by the order, and the number and duration of any extensions of the order; (5) the...
Page 60 - ... the information likely to be obtained is relevant to an ongoing criminal investigation being conducted by that agency.
Page 2 - ... (2) In January of each year the Attorney General, an Assistant Attorney General specially designated by the Attorney General, or the principal prosecuting attorney of a State, or the principal prosecuting attorney for any political subdivision of a State, shall report to the Administrative Office of the United States...
Page 2 - Reports concerning intercepted wire or oral communications "(1) Within thirty days after the expiration of an order (or each extension thereof) entered under section 2518, or the denial of an order approving an interception, the issuing or denying judge shall report to the Administrative Office of the United States Courts — "(a) the fact that an order or extension was applied for: "(b) the kind of order or extension applied for...
Page 33 - ... nations see cyber attacks on our critical infrastructures or military operations as a way to hit what they perceive as America's Achilles heel— our growing dependence on information technology in government and commercial operations. For example, two Chinese military officers recently published a book that called for the use of unconventional measures, including the propagation of computer viruses, to counterbalance the military power of the United States. A Russian official has also commented...
Page 33 - In one example, convicted terrorist Ramzi Yousef, the mastermind of the World Trade Center bombing, stored detailed plans to destroy United States airliners on encrypted files on his laptop computer. While we have not yet seen these groups employ cyber tools as a weapon to use against critical infrastructures, their reliance on information technology and acquisition of computer expertise are clear warning signs.
Page 6 - No action may be brought under this subsection unless such action is begun within 2 years of the date of the act complained of or the date of the discovery of the damage.
Page 3 - ... (f) the number of convictions resulting from such interceptions and the offenses for which the convictions were obtained and a general assessment of the importance of the interceptions; and...

Informations bibliographiques