<p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">Dear All,</p><p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">
Read this on the Threat Post - the Kaspersky Lab Security News Services and found it interesting. I have copied the Article here but if you want to read it from the site directly:</p><p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">
Source: <a href="http://threatpost.com/en_us/blogs/justice-department-backs-closing-loophole-government-e-mail-snooping-031913?utm_source=Newsletter_032013&utm_medium=Email+Marketing&utm_campaign=Newsletter&CID=&CID=">http://threatpost.com/en_us/blogs/justice-department-backs-closing-loophole-government-e-mail-snooping-031913?utm_source=Newsletter_032013&utm_medium=Email+Marketing&utm_campaign=Newsletter&CID=&CID=</a></p>
<p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">Starts</p><p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">
<br></p><p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">The U.S. Justice Department on Tuesday joined a chorus of privacy advocates supporting changes to a 1986 law that currently allows the government to review some emails without a warrant.</p>
<p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">The Electronic Communications Privacy Act was created before commercial e-mail existed, let alone became a primary form of communications. As currently written, the ECPA allows U.S. law enforcement to read someone's emails with just a subpeona from a federal prosecutor if the email is older than six months or is already opened. All others require a warrant from a judge.</p>
<p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">"There is no principled basis to treat e-mail less than 180 days old differently than e-mail more than 180 days old," Elana Tyrangiel, acting assistant attorney general in the Justice Department's Office of Legal Policy, testified before a House judiciary subcommittee.</p>
<div class="node-similar-block" style="width:219px;float:left;margin-right:20px;padding:0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px"><h3 style="font-size:0.85em;line-height:26px;margin:0px;padding-left:15px;height:26px;background-image:url(http://threatpost.com/sites/all/themes/zen/threatpost/images/related-content-top.jpg);background-repeat:initial initial">
Editor's Pick</h3><div class="node-similar-articles" style="border-left-width:1px;border-left-style:solid;border-left-color:rgb(163,163,163);border-right-width:1px;border-right-style:solid;border-right-color:rgb(163,163,163)">
<div class="item-list"><ul style="margin:0px;padding:10px"><li class="first" style="margin-top:0px;margin-right:0px;margin-bottom:10px!important;margin-left:0px;padding:0px;list-style:none!important"><a href="http://threatpost.com/en_us/blogs/illinois-outlaws-employer-requests-facebook-passwords-080112" style="color:rgb(171,15,14);text-decoration:none">Illinois Outlaws Employer Requests for Facebook Passwords</a></li>
<li style="margin-top:0px;margin-right:0px;margin-bottom:10px!important;margin-left:0px;padding:0px;list-style:none!important"><a href="http://threatpost.com/en_us/blogs/t-mobile-wi-fi-calling-feature-susceptible-man-middle-snooping-031913" style="color:rgb(171,15,14);text-decoration:none">T-Mobile Fixes Man-in-the-Middle Vulnerability in Wi-Fi Calling App</a></li>
<li class="last" style="margin-top:0px;margin-right:0px;margin-bottom:10px!important;margin-left:0px;padding:0px;list-style:none!important"><a href="http://threatpost.com/en_us/blogs/how-chrome-browser-privacy-settings-031813" style="color:rgb(171,15,14);text-decoration:none">How To: Chrome Browser Privacy Settings</a></li>
</ul></div></div><div class="node-similar-footer" style="text-align:center;height:21px;background-image:url(http://threatpost.com/sites/all/themes/zen/threatpost/images/related-content-bottom.jpg);background-repeat:initial initial">
<a href="http://threatpost.com/en_us/node/1690" style="color:rgb(171,15,14);font-style:italic;font-size:0.9em">Threatpost Newsletter Sign-up</a></div></div><p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">
Technology companies such as Google and Twitter also back changes to limit government access to citizen's e-mails by requiring court-ordered searches only.</p><p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">
"The distinctions that ECPA made in 1986 were foresighted in light of technology at the time. But in 2013, ECPA frustrates users’ reasonable expectations of privacy," said Richard Salgado, Google's director of law enforcement and information security, <a href="https://docs.google.com/file/d/0BwxyRPFduTN2eTQ1RVJXTGd3eTg/edit?pli=1" class="ext" target="_blank" style="color:rgb(171,15,14)">before the same subcommittee</a><span class="ext" style="background-image:url(http://threatpost.com/sites/all/modules/extlink/extlink.png);padding-right:12px;background-repeat:no-repeat no-repeat"></span>. "Users expect, as they should, that the documents they store online have the same Fourth Amendment protections as they do when the government wants to enter the home to seize documents stored in a desk drawer. There is no compelling policy or legal rationale for this dichotomy.</p>
<p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">He later added, "ECPA worked well for many years, and much of it remains vibrant and relevant. In significant places, however, a large gap has grown between the technological assumptions made in ECPA and the reality of how the Internet works today. This leaves us, in some circumstances, with complex and baffling rules that are both difficult to explain to users and difficult to apply."</p>
<p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">The movement to amend the law to reflect today's concerns is being led by the legislation's original author -- Sen. Patrick Leahy, chairman of the Senate Judiciary Committee.</p>
<p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">"When I led the effort to write ECPA 27 years ago, email was a novelty. No one could have imagined the way the Internet and mobile technologies would transform how we communicate and exchange information today. Three decades later, we must update this law to reflect the realities of our time, so that our federal privacy laws keep pace with American innovation and the changing mission of our law enforcement agencies,” he said in <a href="http://www.latimes.com/business/technology/la-fi-tn-congress-legislation-email-privacy-laws-20130319,0,7308454.story?track=rss" class="ext" target="_blank" style="color:rgb(171,15,14)">a published report</a><span class="ext" style="background-image:url(http://threatpost.com/sites/all/modules/extlink/extlink.png);padding-right:12px;background-repeat:no-repeat no-repeat"></span>.</p>
<p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">Richard Littlehale, who leads an investigative unit of the Tennessee Bureau of Investigation, testified that the law as written has assisted child pornography investigations. He believes the privacy issue to be "oversstated."</p>
<p style="margin:1em 0px;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">"The truth is that no one has put forward any evidence of pervasive law enforcement abuse of ECPA provisions," Littlehale told the House panel, <a href="http://hosted2.ap.org/RIPRJ/f7ded15e4d4846268a17b79c1c4b7cb8/Article_2013-03-19-US-Email%20Privacy/id-06b87118f3e1478c923d7e40f6177232" class="ext" target="_blank" style="color:rgb(171,15,14)">according to the Associated Press.</a><span class="ext" style="background-image:url(http://threatpost.com/sites/all/modules/extlink/extlink.png);padding-right:12px;background-repeat:no-repeat no-repeat"></span></p>
<p class="comment-closer-notice" style="margin:1em 0px;font-style:italic;color:rgb(51,51,51);font-family:Arial,Helvetica,'Bitstream Vera Sans',sans-serif;font-size:14px;line-height:21px">Commenting on this Article will be automatically closed on June 19, 2013.</p>
<div>Ends</div><div><br></div><div><br></div>-- <br><div>Salanieta Tamanikaiwaimaro aka Sala</div><div>P.O. Box 17862</div><div>Suva</div><div>Fiji</div><div><br></div><div>Twitter: @SalanietaT</div><div>Skype:Salanieta.Tamanikaiwaimaro</div>
<div>Tel: +679 3544828</div><div>Fiji Cell: +679 998 2851</div><div>Blog: <a href="http://salanieta.blogspot.com" target="_blank">salanieta.blogspot.com</a><br></div><div> </div><div><font color="#222222" face="arial, sans-serif"><span style="line-height:16px"><br>
</span></font></div>