10 research outputs found

    The Need for Revisions to the Law of Wiretapping and Interception of Email

    Get PDF
    I argue that a person\u27s privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient\u27s mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The statutes must be revised so as to protect the privacy of communications while also providing a means by which law enforcement officers can obtain judicial approval to eavesdrop when necessary. Otherwise, increasing integration between data and voice communications will render the current statutory scheme arbitrary and impractical. By way of background, this article will discuss the law governing mail searches as well as the law of covert searches generally. This article will go on to discuss the regulation of pen registers, and will then trace the evolution of the relevant federal statutory and constitutional protections afforded to telephone conversations. Next, this article will discuss the statutory protections and the emerging case law addressing the privacy of email and other communication via computer. Particular emphasis will be placed on several recent federal court decisions that illustrate the problems arising from the current statutory scheme. Lastly, this article will discuss the controversial implementation of the FBI\u27s Carnivore software for the purpose of surreptitiously intercepting email, and the recent deployment of a keystroke-logging device as another means of learning the contents of private electronic communications. This article asserts that the Fourth Amendment protections applicable to telephone conversations set out by Katz v. United States and Berger v. New York (subsequently codified and expanded by the Federal Wiretap Act) should be implemented more broadly to encompass the surreptitious surveillance of postal mail, email, and other promising forms of electronic communication. This article argues in favor of more uniform regulation of covert surveillance of private communications regardless of the choice of technology employed to convey the message

    Intermingled basins in coupled Lorenz systems

    Full text link
    We consider a system of two identical linearly coupled Lorenz oscillators, presenting synchro- nization of chaotic motion for a specified range of the coupling strength. We verify the existence of global synchronization and antisynchronization attractors with intermingled basins of attraction, such that the basin of one attractor is riddled with holes belonging to the basin of the other attractor and vice versa. We investigated this phenomenon by verifying the fulfillment of the mathematical requirements for intermingled basins, and also obtained scaling laws that characterize quantitatively the riddling of both basins for this system

    Validity of numerical trajectories in the synchronization transition of complex systems

    Full text link
    We investigate the relationship between the loss of synchronization and the onset of shadowing breakdown {\it via} unstable dimension variability in complex systems. In the neighborhood of the critical transition to strongly non-hyperbolic behavior, the system undergoes on-off intermittency with respect to the synchronization state. There are potentially severe consequences of these facts on the validity of the computer-generated trajectories obtained from dynamical systems whose synchronization manifolds share the same non-hyperbolic properties.Comment: 4 pages, 4 figure

    The Need for Revisions to the Law of Wiretapping and Interception of Email

    Get PDF
    I argue that a person\u27s privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient\u27s mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The statutes must be revised so as to protect the privacy of communications while also providing a means by which law enforcement officers can obtain judicial approval to eavesdrop when necessary. Otherwise, increasing integration between data and voice communications will render the current statutory scheme arbitrary and impractical. By way of background, this article will discuss the law governing mail searches as well as the law of covert searches generally. This article will go on to discuss the regulation of pen registers, and will then trace the evolution of the relevant federal statutory and constitutional protections afforded to telephone conversations. Next, this article will discuss the statutory protections and the emerging case law addressing the privacy of email and other communication via computer. Particular emphasis will be placed on several recent federal court decisions that illustrate the problems arising from the current statutory scheme. Lastly, this article will discuss the controversial implementation of the FBI\u27s Carnivore software for the purpose of surreptitiously intercepting email, and the recent deployment of a keystroke-logging device as another means of learning the contents of private electronic communications. This article asserts that the Fourth Amendment protections applicable to telephone conversations set out by Katz v. United States and Berger v. New York (subsequently codified and expanded by the Federal Wiretap Act) should be implemented more broadly to encompass the surreptitious surveillance of postal mail, email, and other promising forms of electronic communication. This article argues in favor of more uniform regulation of covert surveillance of private communications regardless of the choice of technology employed to convey the message

    Application of transfer entropy to causality detection and synchronization experiments in tokamaks

    No full text
    Determination of causal-effect relationships can be a difficult task even in the analysis of time series. This is particularly true in the case of complex, nonlinear systems affected by significant levels of noise. Causality can be modelled as a flow of information between systems, allowing to better predict the behaviour of a phenomenon on the basis of the knowledge of the one causing it. Therefore, information theoretic tools, such as the transfer entropy, have been used in various disciplines to quantify the causal relationship between events. In this paper, Transfer Entropy is applied to determining the information relationship between various phenomena in Tokamaks. The proposed approach provides unique insight about information causality in difficult situations, such as the link between sawteeth and ELMs and ELM pacing experiments. The application to the determination of disruption causes, and therefore to the classification of disruption types, looks also very promising. The obtained results indicate that the proposed method can provide a quantitative and statistically sound criterion to address the causal-effect relationships in various difficult and ambiguous situations if the data is of sufficient quality

    Infektion und Krebsentstehung

    No full text
    corecore