How Does Electronic Surveillance Work Legally?

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
DRAFT 1 Wiretapping of Attorney-Client Conversations: How Can Professional Secrecy be Protected? August 9, 2014.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
NC State University - March David Drooz1 USA PATRIOT Federal anti- terrorism law Effective October 26, 2001 December 31, 2005, sunset for some of.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Legal Aspects of Criminal Investigation: Arrest, Search and Seizure
1/20/02Miller CSC3091 Ch3a Wiretapping. 1/20/02Miller CSC3092 Tap Or Not to Tap Advances in technology are rapidly making traditional wiretaps obsolete.
AJ 104 Chapter 13 Electronic Surveillance and Other Searches.
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
Chapter 18 - The Fourth Amendment and National Security.
Class 11 Internet Privacy Law Government Surveillance.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
The Warrant Process Chapter Three All Images © Microsoft Corporation Written by Karmel Tanner May 2010.
Chapter 19 - Congressional Authority for National Security Surveillance Part II.
The USA PATRIOT Act An Overstatement of ALA Concerns?
The Bill of Rights The First Fundamental Changes of the Constitution.
Chapter 18 - The Fourth Amendment and National Security.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Sniffing and Session Hijacking Lesson 12. Session Hijacking Passive Attacker hijacks a session, but just sits back and watches and records all of the.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
The Federal Court System. Creation of a National Judiciary US law code derived from historical examples  Hammurabi’s Law Code, Ten Commandments and English.
Tracing Requirements AT06 Slide 1. Identification of Ammunition  Essential information Type Calibre Model Lot and Batch Number AT06 Slide 2.
Mr. Gordon March 31, Appreciations, Concerns, Announcements Pre-test and Post-Test Important to take notes in class… Post-test and Final Exam Presentation.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Digital Forensics and Hand Held Devices Robert Trimble COSC
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Bellwork Think about this…. Historical Event
Surveillance around the world
Courts System Search Warrants.
Clash of jurisdictions in the area of data protection
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Cell Site Simulators (“CSSs”)
Steven M. Bellovin, Jason Healey, Matt Waxman Fall 2017
Fourth Amendment and Foundations of Surveillance Law
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Laws Governing Police Surveillance
U.S. Intelligence Oversight Reforms & the Cloud Act
IA455 Chris Danieli and Zachary gibson
Electronic Surveillance, Post 9/11
Texas Search and Seizure
Chapter 23 & 25 – Programmatic Surveillance and Bulk Collection
The Right to Privacy vs. National Security
Presentation transcript:

How Does Electronic Surveillance Work Legally? Title III warrant (content) Remember Katz case FISA order (content) Remember Truong case Transactional info order Remember Third-Party Doctrine

Title III Warrant (Content) Requirements Only certain high-level officials can approve application Warrant application goes to a court (magistrate) Establish facts giving rise to probable cause to believe that certain crime has occurred or will occur and that particular communications concerning the crime will be obtained through intercept Details must include particular description of facilities to be wiretapped, among other requirements Alternative techniques likely to be unsuccessful Minimize interception of irrelevant communications Problem of over-collection Need to sort and delete Materials turned over to the defendant

FISA Order (Content) For standard FISA wiretapping order, application goes to FISC FISC must find probable cause to believe target is foreign power or agent of a foreign power Application must be approved by senior DoJ officials and include detailed facts, including including nature of info sought, and certifcation of foreign intel purpose Procedures to minimize the acquisition, use, and retention of info concerning U.S. persons

Criminal Transactional Info Order (Metadata) Requirements “Pen register” = device which records or decodes dialing, routing, addressing, signaling info “Trap & trace device” = device which captures incoming numbers or other dialing, routing, addressing, signaling info Requires court order (not a warrant) Law enforcement official must represent to court that info likely to be obtained is relevant to ongoing criminal investigation For foreign intelligence, even easier