75
75
Dec 15, 2016
12/16
by
CSPAN
tv
eye 75
favorite 0
quote 0
to his right is amy stepanovich , a surveillance and cyber security expert. to my left is we have matt blaze. he is from the university of pennsylvania. to his left is richard downing, acting assistant ag in charge of cybercrime investigations. gave a good and concise introduction to the issues, so i think we will dive right and. take notes as we discuss and we will be leaving time at the end for your questions. julian mentioned earlier this month a new rule change to "chain control 41" which allows a judge in one district to approve a warrant for law enforcement to hack computers outside the district. it allows government to deposit malware on computers basically for two purposes. to identify ip addresses of one, computers whose locations are unknown and to identify the ip addresses of computers that that have been enslaved by a bot. why does the government need this rule change and what kinds of investigation? >> thanks, ellen. the rule change was brought about by the advance of technology. this role was promulgated back in 1917. it is on 100 years old. ric
to his right is amy stepanovich , a surveillance and cyber security expert. to my left is we have matt blaze. he is from the university of pennsylvania. to his left is richard downing, acting assistant ag in charge of cybercrime investigations. gave a good and concise introduction to the issues, so i think we will dive right and. take notes as we discuss and we will be leaving time at the end for your questions. julian mentioned earlier this month a new rule change to "chain control...
34
34
Dec 21, 2016
12/16
by
CSPAN
tv
eye 34
favorite 0
quote 0
to his right is amy stepanovich, a surveillance and cyber security expert at access now. to my left is we have matt blaze from the university of pennsylvania. to his left is richard downing, acting assistant ag in charge of cybercrime investigations. so, julian gave a good and concise introduction to the issues, so i think we will dive right in.
to his right is amy stepanovich, a surveillance and cyber security expert at access now. to my left is we have matt blaze from the university of pennsylvania. to his left is richard downing, acting assistant ag in charge of cybercrime investigations. so, julian gave a good and concise introduction to the issues, so i think we will dive right in.
54
54
Dec 22, 2016
12/16
by
CSPAN2
tv
eye 54
favorite 0
quote 0
to his right is amie stepanovich, a surveillance and cyber secret expert at axis now, a human rightsgroup. to my left is matt blaze, a cryptographer associate professor computer and information science at the university of pennsylvania. to his left is richard downing, acting deputy assistant ag in charge of cybercrime investigation. so julian gave quite a good and precise introduction to the issues, though i think we will just dive right in, take notes so as we discuss, and because we'll be leaving sometime at the end for your questions. so julian mentioned earlier this month a new role changes took effect called change to rule 41 which allows a judge in one district to approve a warrant for law enforcement to hack computers outside the district. it allows the government to conduct remote searches, remote access searches, or to deposit malware on computers is a good for two purposes. one, to identify ip addresses of computers whose locations are unknown, and to come to identify the ip addresses of computers that it been enslaved by botnet. richard, let's start with you. why doesn't t
to his right is amie stepanovich, a surveillance and cyber secret expert at axis now, a human rightsgroup. to my left is matt blaze, a cryptographer associate professor computer and information science at the university of pennsylvania. to his left is richard downing, acting deputy assistant ag in charge of cybercrime investigation. so julian gave quite a good and precise introduction to the issues, though i think we will just dive right in, take notes so as we discuss, and because we'll be...
24
24
Dec 21, 2016
12/16
by
CSPAN
tv
eye 24
favorite 0
quote 0
to his right is amy stepanovich, a surveillance and cyber security expert at access now. to my left is we have matt blaze from the university of pennsylvania. to his left is richard downing, acting assistant ag in charge of cybercrime investigations. so, julian gave a good and concise introduction to the issues, so i think we will dive right in. take notes as we discussed, because we will be leaving time at the end for your questions. julian mentioned earlier this month a new rule change to affect called "change to rule 41", which allows a judge in one district to approve a warrant for law enforcement to hack computers outside the district. allows governments to conduct remote access searches and deposit malware on computers basically for two purposes. one, to identify ip addresses of computers whose locations are unknown, and two to identify the , ip addresses of computers that that have been enslaved by a bot net. why does the government need this rule change and what kinds of investigation? richard: thanks, ellen. the rule change was brought about by the advance of tec
to his right is amy stepanovich, a surveillance and cyber security expert at access now. to my left is we have matt blaze from the university of pennsylvania. to his left is richard downing, acting assistant ag in charge of cybercrime investigations. so, julian gave a good and concise introduction to the issues, so i think we will dive right in. take notes as we discussed, because we will be leaving time at the end for your questions. julian mentioned earlier this month a new rule change to...