Laws Governing Police Surveillance

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

THE FOURTH AMENDMENT Constitutional Law.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Privacy of Communications: Snail Mail to Telephones.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
Pretext Phone Calls Legal in Canada!!. Police-guided pretext phone calls do not violate Charter s. 8 if prior: -One party consent -Judicial Authorization.
AJ 104 Chapter 13 Electronic Surveillance and Other Searches.
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
Chapter 18 - The Fourth Amendment and National Security.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
“The Fourth Amendment protects people, not places.”
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Chapter 19 - Congressional Authority for National Security Surveillance Part II.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Chapter 18 - The Fourth Amendment and National Security.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Chapter 18 - The Fourth Amendment and National Security Part III.
Understanding the Criminal Justice System Chapter 6: Police and the Constitution.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 7 Search Incident to a Lawful Arrest, Hot Pursuit Criminal Justice Procedure.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 6 Exceptions to the Warrant Requirement: Plain View, Open Fields, Abandoned.
Unit 3 The Fourth Amendment. The Fourth Amendment To The United States Constitution The right of the people to be secure in their persons, houses, papers,
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 5 Automobile Searches: exceptions to the warrant requirement Criminal Justice.
The Paralegal Professional Chapter Eight Criminal Procedure and Administrative Law.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 3 Arrests Criminal Justice Procedure 8 th Edition.
Bellwork Think about this…. Historical Event
Surveillance around the world
Courts System Search Warrants.
Evidence Collection at the Crime Scene and Constitutional Law
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
The University of Adelaide, School of Computer Science
Chapter 23 - Surveillance Abroad
The University of Adelaide, School of Computer Science
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Lesson # 7 A Practical Guide to Computer Forensics Investigations
How Does Electronic Surveillance Work Legally?
Saman Elyahoodayan Wire Taping
Chapter 10: Investigative Constitutional Law
Chapter 8 Police and Constitutional Law
Fourth Amendment and Foundations of Surveillance Law
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
The Fourth Amendment and the Home
Employee Privacy and Privacy of Employee Information
Criminal Procedure: Theory and Practice, 2d.
Interrogations and Confessions
The University of Adelaide, School of Computer Science
America’s Courts and the Criminal Justice System, 13th Edition
Authority to Detain and Arrest; Use of Force
Electronic Surveillance, Post 9/11
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The University of Adelaide, School of Computer Science
The Right to Privacy vs. National Security
Presentation transcript:

Laws Governing Police Surveillance Constitutional Law 12th Edition The University of Adelaide, School of Computer Science 4 February 2019 Chapter 5 Laws Governing Police Surveillance Chapter 2 — Instructions: Language of the Computer 1

Copyright © 2010, Elsevier Inc. All rights Reserved. Introduction To safeguard the privacy of innocent persons, the interception of wire or oral communications . . . should be allowed only when authorized by a court [and] with assurances that the interception is  justified and that the information obtained thereby will not be misused. —Congressional Findings, Omnibus Crime Control and Safe Streets Act of 1968 Copyright © 2010, Elsevier Inc. All rights Reserved.

Copyright © 2010, Elsevier Inc. All rights Reserved. Threshold Question Does the activity in question constitute a search? if yes, then it will require a: warrant interception order other form of judicial approval  if no, then: police may conduct their investigations, without concern for the Fourth Amendment there may be statutory requirements Copyright © 2010, Elsevier Inc. All rights Reserved.

Supreme Court Decisions Olmstead v. United States (1928) decided that wiretapping did not constitute a search not a violation of the Fourth Amendment Katz v. United States (1967) overruled Olmstead “The Fourth Amendment protects people, not places” warrantless wiretapping violates the Fourth Amendment Copyright © 2010, Elsevier Inc. All rights Reserved.

Copyright © 2010, Elsevier Inc. All rights Reserved. Legislation Wiretap Act (Title III of the Omnibus Crime Control and Safe Streets Act of 1968): wiretap order is required amended to provide protection for electronic communication Copyright © 2010, Elsevier Inc. All rights Reserved.

Non-Assisted Surveillance How the Fourth Amendment applies: exposed to public view not protected police, where lawfully present, may use natural senses home heightened protection warrantless surveillance may not be conducted from inside curtilage open field carries no protection information voluntarily disclosed to third party no protection Copyright © 2010, Elsevier Inc. All rights Reserved.

Copyright © 2010, Elsevier Inc. All rights Reserved. Hoffa Doctrine The Fourth Amendment does not protect “a wrongdoer’s misplaced belief that a person to whom he voluntarily confides his wrongdoing will not reveal it.” Copyright © 2010, Elsevier Inc. All rights Reserved.

Copyright © 2010, Elsevier Inc. All rights Reserved. Electronic Tracking How the Fourth Amendment applies: public movements “free zone” activity no protection objects inside a home or other location protected by the Fourth Amendment: search warrant required Copyright © 2010, Elsevier Inc. All rights Reserved.

Copyright © 2010, Elsevier Inc. All rights Reserved. Detection Devices How the Fourth Amendment applies: devices capable of revealing only the presence of contraband no protection metal detectors and X-ray scanning machines compliance with administrative search exception to warrant requirement individualized suspicion thermal sensors aimed at home search warrant Copyright © 2010, Elsevier Inc. All rights Reserved.

Copyright © 2010, Elsevier Inc. All rights Reserved. Wiretap Act a wiretap order is necessary to intercept a protected communication  unless one of the parties consents interception occurs: when a device is used to acquire access to the contents of a protected communication  in the course of its transmission Copyright © 2010, Elsevier Inc. All rights Reserved.

What the Wiretap Act Protects wire (communications containing the human voice that travel through wires at some point in transmission) oral (communications carried by sound waves) electronic (data transmitted over a wide range of mediums) Copyright © 2010, Elsevier Inc. All rights Reserved.

What the Wiretap Act Limits the crimes for which wiretap orders may be issued the duration of wiretap orders to a maximum of: 30 days attainment of objective fresh application required to extend disclosure and use of communications intercepted to: furtherance of investigation national defense and security giving testimony in court Copyright © 2010, Elsevier Inc. All rights Reserved.

What the Wiretap Act Requires approval by a high-ranking official within the Justice Department before the application can be submitted to the court proof that traditional investigative techniques: have been tried and failed appear unlikely to succeed are too dangerous to try establishment of probable cause that wiretap orders be executed so as to minimize intrusions into communications not related to the investigation Copyright © 2010, Elsevier Inc. All rights Reserved.

Wiretap Act Does Not Protect conversations overheard naturally targets who lack a reasonable expectation that communication is not being intercepted a party consents to interception Copyright © 2010, Elsevier Inc. All rights Reserved.

E-mail, Voice/Text Messages Wiretap Act protects interception of e-mail during the transmission stage only Stored Wire and Electronic Communications and Transactional Records Act protects e-mail after the message has reached its intended destination also protects voice mail, text messages, and transactional records provides a lower standard of protection than the Wiretap Act Copyright © 2010, Elsevier Inc. All rights Reserved.

Copyright © 2010, Elsevier Inc. All rights Reserved. FISA  electronic surveillance conducted inside the United States for the purpose of gathering foreign intelligence surveillance orders require probable cause that: the target is a foreign power the target is an agent of a foreign power the target is a member of an international terrorist organization surveillance order not required for international communications between persons inside the United States and persons overseas if the target is the person overseas Copyright © 2010, Elsevier Inc. All rights Reserved.