Saturday, July 7, 2012

Webinar\Training: Guidelines Governing Criminal Background Checks

National Reentry Resources Center

Council of State Governments Justice Center

Supported by the Bureau of Justice Assistance


Hosted by the National Employment Law Project, and the National Reentry Resource Center
The nation’s 3,000 One-Stop Career Centers and their partners in the employer, non-profit, and worker rights communities play a critical role in assisting people with criminal records in finding employment. However, the workforce development community also faces challenges as workers struggle to navigate the new realities of criminal background checks for employment.

Thanks to new guidelines issued by the U.S. Department of Labor Employment and Training Administration (ETA) and Civil Rights Center (CRC), the federally-funded workforce development and employment exchange community (i.e., programs funded by the Workforce Investment Act and the Wagner-Peyser Act) are now better positioned to respond to these challenges. The guidance educates employers and workers about the civil rights and consumer protection considerations that regulate criminal background checks for employment.

DOL's guidance letter complements the new guidance recently issued by the U.S. Equal Employment Opportunity Commission, which addresses the disproportionate impact of criminal background checks on people of color. The DOL guidance provides a step-by-step guide, including model notices for both employers and workers, to ensure that the workforce development community promotes maximum compliance with the law.
Presenters:
  • Jane Oates, Assistant Secretary, Employment Training Administration, U.S. Department of Labor
  • Maurice Emsellem, Policy Co-Director, National Employment Law Project
  • Charles Turner, Adult Career Services Re-Entry Manager, Oakland Private Industry Council, Inc.
  • Others TBA
Date: Wednesday, July 18, 2012
Time: 2:15-3:15 p.m. ET
To register for this webinar, please click here.


This is a National Reentry Resource Center Announcement. This announcement is funded in whole or in part through a grant (award number: 2010-MUBX-KO84) from the Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice. Neither the U.S. Department of Justice nor any of its components operate, control, are responsible for, or necessarily endorse, this newsletter (including, without limitation, its content, technical infrastructure, and policies, and any services or tools provided). 

FCC: Network Outage Reporting System (NORS) Communications Infrastructure.


NETWORK OUTAGE REPORTING SYSTEM (NORS)

network outage
Obtaining information on communications service disruptions is essential to the FCC's goal of ensuring the reliability and security of the nation's communications infrastructure. Accordingly, the FCC requires communications providers, including wireline, wireless, paging, cable, satellite and Signaling System 7 service providers, to electronically report information about significant disruptions or outages to their communications systems that meet specified thresholds set forth in Part 4 of the FCC's rules (47 C.F.R. Part 4). Communications providers must also report information regarding communications disruptions affecting Enhanced 9-1-1 facilities and airports that meet the thresholds set forth in Part 4 of the FCC's rules. Given the sensitive nature of this data to both national security and commercial competitiveness, the outage data is presumed to be confidential.
NORS is the web-based filing system through which communications providers covered by the Part 4 reporting rules submit reports to the FCC. This system uses an electronic template to promote ease of reporting and encryption technology to ensure the security of the information filed. The Communications Systems Analysis Division of the FCC's Public Safety and Homeland Security Bureau administers NORS, monitors the outage reports submitted through NORS and performs analyses and studies of the communications disruptions reported.

FCC DOCUMENTS PERTAINING TO NETWORK OUTAGE REPORTING:

FCC: Disaster Information Reporting System (DIRS) for Communications Companies


DISASTER INFORMATION REPORTING SYSTEM (DIRS)



DIRS is a voluntary, web-based system that communications companies, including wireless, wireline, broadcast, and cable providers, can use to report communications infrastructure status and situational awareness information during times of crisis.
The FCC encourages all communications providers to enroll in DIRS to be better prepared to respond and recover in the event of a disaster.

BENEFITS FOR COMMUNICATIONS PROVIDERS

  • Designate contact: Allows communications providers to identify the appropriate contact for his/her station during emergencies; and, in turn, eliminates lost time when trying to identify and coordinate with the federal contacts who can provide immediate assistance.
  • Receive help: Provides an avenue for communications providers to restore their operations and receive additional help during emergencies, e.g., securing generators, fuel, etc.
  • Streamline requests: Reduces the number of requests from various government agencies for status of each station. Other government agencies will rely on the FCC (DIRS) for status of each broadcast station.
  • Aid your community: Better ensures that communications providers will be able to serve their communities, providing them with critical updates and risk communications information from reliable and credible sources during emergencies.

In the event of a major disaster, the FCC and the Department of Homeland Security's National Communications System need to have accurate information regarding the status of communications services in the disaster area, particularly during restoration efforts.
When activated, DIRS will collect information concerning:
  • Switches
  • Public Safety Answering Points (used for E9-1-1)
  • Interoffice facilities
  • Cell sites
  • Broadcast stations
  • Cable television systems

HOW TO ENROLL IN DIRS:

  • Click the “Enroll” button.
  • Click “Accept” to enter the secure, protected sign-up site.
  • You will need the following information to sign up:
    • Reporting Company
    • Company ID (for existing company accounts)
    • Type of Company (Cable, Wireless, etc)
    • Contact Person
    • Phone Number, with extension of contact
    • Cell Phone Number
    • Blackberry Number
    • E-Mail
    • Address
  • Click “Submit” and record the username and password generated for your account. You can update the username and password once logged in.

FREQUENTLY ASKED QUESTIONS

RELEASES

Friday, July 6, 2012

Privacy. Email. Is US Government reading email without a warrent?


Is US government reading email without a warrant? It doesn't want to talk about it

Jonathan Sanger / msnbc.com
Catherine Crump, a staff attorney for the ACLU
Does the U.S. government read your email? It's a simple question, but apparently there's no simple answer. And the Justice Department and the Internal Revenue Service are reluctant to say anything on the topic.
In March, the American Civil Liberties Union caused a nationwide stir when the advocacy group released the results of its year-long investigation into law enforcement use of cellphone tracking data. After issuing hundreds of Freedom of Information Act requests, the ACLU learned that many local police departments around the country routinely pay mobile phone network operators a small fee to get detailed records of historic cell phone location information. The data tell cops not just where a suspect might have been at a given moment, but also create the possibility of retracing someone's whereabouts for months. In most cases, law enforcement obtains the data without applying for a search warrant; generally, subpoenas are issued instead, which require law enforcement to meet a lower legal standard.


ACLU lawyer Catherine Crump, who ran the cellphone location data investigation, is at it again. This time, she has filed similar Freedom of Information Act requests with several federal agencies, asking about their policies and legal processes for reading Internet users' emails.

"It's high time we know what's going on," Crump told msnbc.com. "It's been clear since the 1870s that the government needs a warrant to read postal mail. There's no good reason email should be treated differently."
There are hints that it is being treated differently, however. In a landmark 2010 case, United States v. Warshak, government investigators acknowledged that they read 27,000 emails without obtaining a search warrant, violating both the suspect's privacy and the privacy of everyone who communicated with the suspect, according to Crump.

Evidence obtained during that email search was thrown out on appeal by the 6th U.S. Circuit Court of Appeals, but that ruling applies only to four U.S. states.

The case opened a window into what Crump fears is a widespread practice.
In the aftermath of the Warshak case, the Internal Revenue Service told its investigators that they should not try to obtain emails without a court order, but in doing so it hinted that other warrantless email searches had been conducted in the past.

For now, hints are all we have. Crump's Freedom of Information Act requests -- filed in February with the FBI, the IRS, the Justice Department's Office of Legal Counsel and other agencies -- were largely ignored, she says. So on June 14, she filed a lawsuit in the Southern District of New York in an attempt to force the agencies to comply.

"Four months have passed and I haven't gotten a single document," she said. "The American people have a right to know."

The federal agencies have until July 19 to reply to the lawsuit. The FBI is not included in the lawsuit because it replied recently denying Crump's request, saying it was too broad. The ACLU is appealing that determination through a different legal procedure.

Justice Department spokesman Charles Miller directed all questions about the matter to the agency's New York office. A spokeswoman for that office, Ellen Davis, said she couldn't discuss it.

"We do not comment on ongoing litigation," Davis said in an email.
Julianne Breitbeil, a spokeswoman for the IRS, said federal privacy laws prevent the agency from discussing the lawsuit.

The Justice Department and the Obama administration had a chance to settle the issue in April 2011, during a Senate hearing on the Electronic Communications Privacy Act. Instead, officials with both the Commerce and Justice departments failed to provide any clarity. Instead, a Justice Department official argued against extending Fourth Amendment protections -- specifically strict warrant requirements -- to email, saying that doing so would hinder investigations.

"Congress should consider carefully the adverse impact on criminal as well as national security investigations if a probable-cause warrant were the only means to obtain such stored communications," James Baker, associate deputy attorney general, testified at the hearing.

Crump interpreted the testimony as indicating that warrantless email searches by federal agents are routine.
"It was disappointing when the Obama administration refused to commit one way or the other to obtaining a warrant," she said. "It leads me to suspect the federal government isn't getting warrants."

The 1986 Electronic Communications Privacy Act and its subsection, the Stored Communications Act, provides some guidelines for law enforcement review of email, but those are badly out of date now. They declare that federal authorities don't need a warrant for data that's stored externally (as opposed to locally, on a person's hard drive) if it's more than 6 months old. Given the ubiquity of services like Web-based Gmail, the 180-day distinction and the local vs. network storage issues are both now largely meaningless, and that's essentially what the 6th Circuit Court found.

The discussion of requirements for email searches is more relevant than ever, given the explosion of social networks and their semi-private conversation tools and the coming of age of cloud services, where corporations are encouraged to keep all data in shared spaces that would fall under the Stored Communications Act. Concerned that such privacy issues would slow adoption of cloud services, a coalition of cloud-friendly companies calling itself "Digital Due Process," has argued for updates to the Electronic Communication Act that would require higher legal standards for digital evidence gathering.





A critical element of the email issue is a debate about whether the Fourth Amendment requires the government to get warrant based on probable cause in order to read a suspect’s email. To get a warrant, the government must appear before a judge, and convincingly argue that inspection a suspect’s email will probably turn up evidence of a crime.

"The warrant and probable cause requirement safeguard Americans' privacy in two important ways. Having to go to a judge means there is someone involved whose job it is to look out for the target's rights. And having to demonstrate probable cause will reduce the chances that innocent people have their communications read," Crump said.

The distinction is also important as the U.S. government plunges headlong into new high-tech surveillance technologies, such as its massive new million-square-foot "Utah Data Center," under construction in rural Utah for the National Security Agency. The facility is designed to help protect cyberspace, NSA official have said. But Wired Magazine published a cover story earlier this year arguing that the facility will be capable of monitoring every email and text message sent around the world -- including messages to and from U.S. citizens. It is scheduled to come online in 2013.

The NSA denies that the facility will be used to spy on Americans, but it's hardly far-fetched to surmise it will have such capabilities.

Explosion of such technological capabilities is why clarifying digital Fourth Amendment rights is so critical, Crump said.

"No data is more personal than email correspondence," she said. "Email is deeply personal and private. It is an unfiltered view of our thoughts and a catalog of our relationships stretching back for years. Government agents should not be allowed to troll through all of our most private correspondence without proving to a judge that they have probable cause to believe that a search will turn up evidence of a crime."

Thursday, July 5, 2012

Tuskegee Airmen. 2012 Bridge Dedication. Boston, MA


Tuskegee Airmen 7.17.12
You are invited to...

A Bridge Dedication in Honor of the
Tuskegee Airmen

Tuesday, July 17, 2012 at 10:30am
American Legion Highway and Morton St., Dorchester
The bridge is located outside VFW Post 1018
(with Tank out front)

The Museum of African American History is proud to announce the special occasion
of a bridge dedication in honor of the legendary Tuskegee Airmen, a group of heroic African American pilots who fought in World War II.

This event is sponsored and organized by the City of Boston.

RSVP to Walter Apperwhite at Walter.Apperwhite@cityofboston.gov

LOGO
This is not a Museum of African American History event.  

RECOMMENDED READING LIST

Search This Blog

ARCHIVE List 2011 - Present