The Integrity News
Vol. XII No. 12 ISSN 1081-2717 March 27, 2003
Cover Story - March 24, 2003
March 27, 2003
"The Justice Department is drafting
a sequel to the USA Patriot Act. The
Domestic Security Enhancement Act
(DSEA), which is the proposed name,
would enhance Government powers."
It's important that you stay abreast of
DSEA developments in that they may
influence your decisions on personnel,
hardware, software, and security.
In the current draft, "the DESA would
enhance Government power to eavesdrop
on communications over multifunction
devices, establish a national DNA
database of broadly defined 'suspected
terrorists', and add a minimum of five
years to criminal sentences for knowingly
using encryption technology while
committing a crime."
"Industry experts are concerned that
such a provision could create a disincentive
for computer users generally to use
common safe-computing measures."
The draft also says "that software makers
and ISPs potentially should give law
enforcement access to 'keys' for the
purpose of decoding intercepted
communications". "Handing over wireless
application protocol keys would let them
monitor entire networks." "If they asked
for access to one person's communications,
they would then be able to have access to
the entire network."
"Another provision in the draft seeks to
expand surveillance powers generally".
"The DSEA would also broaden the scope
of surveillance warrants and enhance the
Government's ability to monitor multi-
function devices, such as PDAs. If the
Government could show probable cause
that one type of communications is
relevant to a crime, it would receive
automatic approval to access other types
of communications." "Under the proposal,
individuals using multifunction devices
forgo privacy protections that they would
receive using less advanced communications
technologies."
Clearly, the Government should have the
laws that it needs to thwart and apprehend
both foreign and domestic terrorists. But,
knowing that, companies (1) need to screen
their people thoroughly, (2) keep track of
what their company property is being used
for, and (3) design their operations such that
if a 'bad guy' does need to be monitored by
law enforcement, that all of the company's
proprietary operations are not at risk of
being exposed.
|
|