Search for: "Application of US Authorizing Interception, Etc." Results 1 - 20 of 60
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
14 Nov 2019, 12:14 pm by Albert Gidari
Have US providers (i.e., platforms and email providers) received wiretap orders on email or other applications from US authorities? [read post]
12 Oct 2018, 6:00 am by Chinmayi Sharma
Section 15 limits the disclosure and use of information obtained through interception warrants by requiring the secretary of state to minimize the number of individuals authorized to access the information and to destroy all information after it is deemed no longer necessary. [read post]
23 Jan 2008, 6:48 am
Statistics are provided for things such as the number of applications made for authorizations and for renewals of authorizations, the period for which authorizations and renewals were granted, a description of the methods of interception, the offences specified in authorizations (e.g. possession of a narcotic for the purpose of trafficking, smuggling/attempt to smuggle goods into Canada, laundering proceeds of excise offences, forgery of… [read post]
25 Mar 2014, 9:32 am by Tom Webley
The complaint sought damages on behalf of individuals who either used Gmail or exchanged messages with those who used Gmail and had their messages intercepted by Google. [read post]
4 Jul 2011, 7:51 am by Jeralyn
The number of authorized intercept applications reported by year increased 168 percent between 2000 and 2010. [read post]
3 May 2019, 9:49 am by Rebecca Tushnet
If you can’t see ads from Costco, Wal-Mart, etc. when you search 1800 Contacts, then you may be getting less relevant ads. [read post]
8 Oct 2020, 11:47 am by Rachel Casper
A more secure MFA method is to use an authentication app such as Authy, Duo, Google Authenticator, Microsoft Authenticator, etc. [read post]
8 Oct 2020, 11:47 am by Rachel Casper
A more secure MFA method is to use an authentication app such as Authy, Duo, Google Authenticator, Microsoft Authenticator, etc. [read post]
29 Oct 2014, 4:16 pm by Amul Kalia
And if the challenges of real-time interception threaten to leave us in the dark, encryption threatens to lead all of us to a very dark place.Yet instead of giving any actual examples of terrorism cases, both men could only muster edge cases in their pitch for weakening encryption. [read post]
23 Aug 2013, 1:05 am by Prashant Reddy
Then there are sector wise legislations governing how the private sector and state governments use and share data in the sectors of health, banking etc. [read post]
11 Dec 2017, 6:00 am by Nicholas Weaver
In a criminal investigation, the government may apply for a court order authorized under the Electronic Communications Privacy Act, specifically 18 U.S.C. [read post]
7 Sep 2016, 7:22 am by Graham Smith
       The statutory purposes (national security etc). [read post]
7 Sep 2016, 7:22 am by Graham Smith
       The statutory purposes (national security etc). [read post]
7 Sep 2016, 7:22 am by Graham Smith
       The statutory purposes (national security etc). [read post]
16 Aug 2012, 11:53 pm by Orin Kerr
It’s one of the “hybrid” orders that DOJ has tried to use (or at least was using as of 2006, the date of the order) that combines several statutory authorities at once — pen trap, 2703(d), subpoena, etc. [read post]
12 Nov 2011, 12:56 pm by Rebecca Tushnet
So if we look at Doubleclick case, disclosing cookies to marketing affiliates; court held that the website was the intended recipient of info and thus had the authority to share or authorize Doubleclick to intercept the data.10 years later, Facebook: Court says it doesn’t matter who the user is communicating with. [read post]
31 Dec 2013, 2:54 pm by Benjamin Wittes
Starting in this post, I turn to the recommendations of Chapter IV, which deal with collection under Section 702 and other authorities directed at non-US persons. [read post]
17 Feb 2016, 9:58 am by Robert Chesney
 Here is the situation: the FBI has possession of an iPhone 5C used by Syed Rizwan Farook, as well as a warrant authorizing it to access that device. [read post]