Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Seven Police Technology Communications Dispatch.
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Privacy of Communications: Snail Mail to Telephones.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Eleven Police Technology Information Exchange.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fifteen Police Technology Tracking and Surveillance.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
NC State University - March David Drooz1 USA PATRIOT Federal anti- terrorism law Effective October 26, 2001 December 31, 2005, sunset for some of.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Chapter 17 Law and Terrorism.
CSCD 496 Computer Forensics
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
Basics of Privacy TC 310 June 16, Protections of Privacy Not explicitly protected (by Right)‏  Fourth Amendment is closest Penumbra Protection.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
AJ 104 Chapter 13 Electronic Surveillance and Other Searches.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
Federal Bureau of Investigation
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Computer Programming I
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
CARNIVORE And Other Computer Spy Programs. What is Carnivore? Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. Carnivore is a computer-based.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
Identifying and Arresting Suspects
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Chapter 18 - The Fourth Amendment and National Security.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Surveillance around the world
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Lesson # 7 A Practical Guide to Computer Forensics Investigations
How Does Electronic Surveillance Work Legally?
Public Recording of Police
Intercepting Communications
Laws Governing Police Surveillance
Pre-Trial Procedures Search and Seizure.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
The University of Adelaide, School of Computer Science
Betty Fermin Rajal Patel Amanda Poirier David Pandolfo
The Right to Privacy vs. National Security
Presentation transcript:

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Learning Objectives Context and value of gathering covert information Context and value of gathering covert information Difference between device-identifying information and call-content information Difference between device-identifying information and call-content information Impact of Communications Assistance for Law Enforcement Agencies (CALEA) Impact of Communications Assistance for Law Enforcement Agencies (CALEA) Legal and practical aspects of wiretaps Legal and practical aspects of wiretaps PEN registries, traps, traces and the Internet PEN registries, traps, traces and the Internet The Patriot Act The Patriot Act

Copyright : Hi Tech Criminal Justice, Raymond E. Foster What is Electronic Surveillance? Intercepting information by electronic means from: Telephone calls. Private conversations Internet communications Photograph provided by Robert Eplett, California Governor’s Office of Emergency Services

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Legal History of Wiretaps 1928 Olmstead v United States – not illegal unless trespass is involved Olmstead v United States – not illegal unless trespass is involved. 1934, Congressional Communications Act – although it said that wiretaps were essentially illegal, it was still interpreted – no trespass, not illegal 1934, Congressional Communications Act – although it said that wiretaps were essentially illegal, it was still interpreted – no trespass, not illegal 1967 court decisions provided telephone communications with the full protection of the Fourth Amendment – No warrant no tap court decisions provided telephone communications with the full protection of the Fourth Amendment – No warrant no tap.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Legal History of Wiretaps 1968 Omnibus Crime Control and Safe Streets Act - specified rules state and federal organizations must follow Omnibus Crime Control and Safe Streets Act - specified rules state and federal organizations must follow. Required both prosecutorial and judicial review Required both prosecutorial and judicial review 1994 Communications Assistance for Law Enforcement Act (CALEA) - required commercial carriers cooperation Communications Assistance for Law Enforcement Act (CALEA) - required commercial carriers cooperation.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Legal History of Wiretaps 1986 Electronic Communications Privacy Act (ECPA) – Established a lower threshold of judicial review for capturing device identifying information Electronic Communications Privacy Act (ECPA) – Established a lower threshold of judicial review for capturing device identifying information USA PATRIOT Act – reduced threshold for some federal wiretaps and, in some instances, for “roving” taps USA PATRIOT Act – reduced threshold for some federal wiretaps and, in some instances, for “roving” taps.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Wiretap Definitions Call content is the substance of the call – the conversation. Call content is the substance of the call – the conversation. For internet communications this would be the subject line and body of the message in an communication. For internet communications this would be the subject line and body of the message in an communication. Device identifying information is the commonly the telephone number of the callers. Device identifying information is the commonly the telephone number of the callers. For internet communications it would be the to and from lines of an message. For internet communications it would be the to and from lines of an message.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Wiretap Definitions Operational Security refers to the concept that the target, or unauthorized persons, should not have knowledge of the wiretap during the investigation. Both the agency conducting the wiretap and the service provider have responsibilities. Primarily, the service provide must ensure transparency – that is a tapped call sounds no different to the target. Typical wiretap hardware. Photograph provided by ADACS Corp.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster General Wiretap Rules Generally requires both prosecutorial and judicial review. Generally requires both prosecutorial and judicial review. Wiretaps require probable cause like any search warrant. Wiretaps require probable cause like any search warrant. Must focus on gaining specific information about a crime – not just general investigative information Must focus on gaining specific information about a crime – not just general investigative information

Copyright : Hi Tech Criminal Justice, Raymond E. Foster General Wiretap Rules To obtain court order, investigators must show that the information cannot be obtained in another manner. To obtain court order, investigators must show that the information cannot be obtained in another manner. Investigators must provide the court with: Investigators must provide the court with: Articulate specific offense. Articulate specific offense. Specific place to be tapped. Specific place to be tapped. Types of conversations believed to be overheard. Types of conversations believed to be overheard.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster General Wiretap Rules Because wiretaps require judicial and prosecutorial review (and significant technology and personnel resources) it is likely the process will require significant bureaucratic review within their organization. Because wiretaps require judicial and prosecutorial review (and significant technology and personnel resources) it is likely the process will require significant bureaucratic review within their organization. Intercepted conversations must be recorded and protected from editing, alteration or deletion. Intercepted conversations must be recorded and protected from editing, alteration or deletion.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster General Wiretap Rules Investigators must protect the Rights of non-involved persons. Generally, a conversation is monitored for a limited time and if it is not criminal in nature the tap is discontinued – a single call may be checked periodically to determine if a relevant conversation has begun.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster General Wiretap Rules In most states, only investigator’s with specialized training can overhear live conversations. However, once a conversation has been recorded it is considered evidence and anyone with access to the evidence can listen to the conversations. In most states, only investigator’s with specialized training can overhear live conversations. However, once a conversation has been recorded it is considered evidence and anyone with access to the evidence can listen to the conversations.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster General Wiretap Rules Every five days the investigators must provide the judicial authority with a thorough review of the conversations. Every five days the investigators must provide the judicial authority with a thorough review of the conversations. In addition to five day review, at the end of the tap, the investigator’s must provide both the judicial and prosecutorial authority with a complete review. In addition to five day review, at the end of the tap, the investigator’s must provide both the judicial and prosecutorial authority with a complete review. Thirty days after the conclusion of the tap, each person whose conversations were recorded must be notified in writing. Thirty days after the conclusion of the tap, each person whose conversations were recorded must be notified in writing.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Conducting a Wiretap Generally, wiretaps are expensive and technology intensive operations – the service provider intercepts the call and forwards it to a wire room. Generally, wiretaps are expensive and technology intensive operations – the service provider intercepts the call and forwards it to a wire room. Because of the investment required many jurisdictions use regional wire rooms – locations specifically designed and dedicated to wiretaps. Because of the investment required many jurisdictions use regional wire rooms – locations specifically designed and dedicated to wiretaps.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Conducting a Wiretap Technology has made compliance much simpler. For instance, software can now be used to record conversations and provide the necessary reporting. Screen Capture provided by Pen-Link™

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Wiretap Software As investigators monitor telephone conversations they have the ability to connect to other databases and begin to integrate the information. Screen Capture provided by Pen-Link™

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Pens, Traps and Traces A Pen register refers to capturing call- identifying information with the content…who is calling who, but not what they are taking about. This is an device connected to a local junction box and retrieved later. Photograph provided by Dianatek Corp.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Pens, Traps and Traces In compliance with with CALEA, cellular and hard- wired telephone identifying information is now routed to law enforcement via secure TCP/IP connection. With Cellular information, the cell site can be known and the target’s general location determined. Indicates cell reception Screen Capture provided by Pen-Link™

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Pens, Traps and Traces Device identifying information may establish co-conspirators or draw a link between the target and a crime. Device identifying information may establish co-conspirators or draw a link between the target and a crime. TRAPS and TRACES are very much like the caller identification information commercially available to consumers. These devices let investigator’s who is calling – typically used in stalking or annoying telephone call investigations. TRAPS and TRACES are very much like the caller identification information commercially available to consumers. These devices let investigator’s who is calling – typically used in stalking or annoying telephone call investigations.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Internet Communications Through , chat and websites, the internet has become a form of criminal communications. Like wire taps, identifying information and content information have different judicial thresholds.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Internet Communications Network diagnostic tools called packet sniffers are used to inspect data as it flows across the Internet. Network diagnostic tools called packet sniffers are used to inspect data as it flows across the Internet. These software programs can “sniff” for addressees, addressors and content in communications. These software programs can “sniff” for addressees, addressors and content in communications. Recently, the Federal Bureau of Investigation has not used its own “sniffer” Carnivore, but another commerical product. Recently, the Federal Bureau of Investigation has not used its own “sniffer” Carnivore, but another commerical product.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Magic Lantern There are any number of software programs that can be loaded onto a computer to record keystrokes. This is a way to surreptitiously gain passwords. Most recent referred to as Keylogger software, commercially available and used on home as well as commercial PCs.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Telephone and Investigations More than just receiving and sending information, the telephone is an investigative tool. Miranda requires detention and accusatory questions If the target is free to hang-up they are not detained and therefore no Miranda protection Photograph provided by Robert Eplett, California Governor’s Office of Emergency Services

Copyright : Hi Tech Criminal Justice, Raymond E. Foster USA PATRIOT Act Several sections are expiring and up for renewal in Several sections are expiring and up for renewal in Judicial review threshold lowered for “roving” warrants. Judicial review threshold lowered for “roving” warrants. A roving warrant means the target is the subject, not the telephone. If the target changes telephones the investigators can continue to monitor A roving warrant means the target is the subject, not the telephone. If the target changes telephones the investigators can continue to monitor Made telephone and Internet intercepts similar. Made telephone and Internet intercepts similar. Changed threshold on use of FISA courts and domestic surveillance. Changed threshold on use of FISA courts and domestic surveillance.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Explore leadership at leadership