Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts.

Slides:



Advertisements
Similar presentations
THE FOURTH AMENDMENT Constitutional Law.
Advertisements

SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
March, – June 20, 1979 Heard at U.S. Supreme Court A Pro-Prosecution Case.
The Fourth Amendment and Public Schools
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Privacy of Communications: Snail Mail to Telephones.
Teaching American History: Moot Courts and Constitutional Concepts.
Criminal Procedure for the Criminal Justice Professional 11th Edition
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Privacy & Personal Information -- Why do we care or do we?
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
The Fourth Amendment and Students’ Rights in Public Schools.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Class 11 Internet Privacy Law Government Surveillance.
Case Study Presentation
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
“The Fourth Amendment protects people, not places.”
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Search & Seizure Stephanow th Amendment. CRIMINAL JUSTICE PROCESS in TEXAS =3952&TEMPLATE=/ContentManagement/ContentDisplay.cfm.
Student Search and Seizure
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
The Bill of Rights The First Fundamental Changes of the Constitution.
THE 4 TH AMENDMENT The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Privacy and the Law in Demand Response Energy Systems Deirdre K. Mulligan, Jack I. Lerner Erin Jones, Jen King, Caitlin Sislin, Bethelwel Wilson, Joseph.
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
The Fourth Amendment and the Home By Laura Zajac.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
The Fourth Amendment, Technology, and a Right to Privacy
4 th Amendment: Search and Seizure. The Fourth Amendment to the U.S. Constitution protects personal privacy, and every citizen's right to be free from.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
Fourth Amendment Search and Seizure Civil Liberties.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
1 st Amendment: Freedom of Expression “Congress shall make no law.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 6 Exceptions to the Warrant Requirement: Plain View, Open Fields, Abandoned.
Unit 3 The Fourth Amendment. The Fourth Amendment To The United States Constitution The right of the people to be secure in their persons, houses, papers,
CLASS NO. 2 4 TH Amendment. Review Incorporation Doctrine Retroactivity –Gen. Rule: Decisions are not retroactive for habeas corpus cases –Exceptions:
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Surveillance around the world
Courts System Search Warrants.
SEARCH & SEIZURE.
Limiting the Right of Search
Evidence Collection at the Crime Scene and Constitutional Law
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Forensics Week 7.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
The Fourth Amendment and the Home
Understanding Law: Mr Thompson, APT Academy
What Happens After Jardines?
Laws Governing Police Surveillance
Bell Work (Think of your response and be prepared to share)
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
IA455 Chris Danieli and Zachary gibson
Presentation transcript:

Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts Macro level – what kind of world do we want to live in

Why do we care about privacy Why do you care, or not, about privacy? Why does society protect it, or not? Reflections from what we’ve read this semester?

What does it protect? Literally? Figuratively?

What sort of right or interest is it? Is it an end or a means? Or both? What happens without it? –How do you know? What values is it in tension with? –How do you harmonize or balance? How does technology challenge conceptions of privacy?

Scope of 4th A Protection The 4 th Amendment: –The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but on probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the person or things to be seized.

Scope of 4th A Protection Katz v. U.S. 389 U. S. 347, 353 (1967). “the Fourth Amendment protects people—and not simply ‘areas’…the reach of that Amendment cannot turn upon the presence or absence of a physical intrusion into any given enclosure.” Test –You must have an actual, subjective expectation of privacy. –It must be an expectation that is objectively reasonable (“one society is prepared to recognize as ‘reasonable’” U. S. 347, 361 (Justice Harlan concurring)).

Scope of 4th A Protection Smith vs. Maryland, 1979 –individuals have no legitimate expectation of privacy in the phone numbers they dial, and therefore the installation of a technical device (a pen register) that captured such numbers on the phone company's property did not constitute a search. United States v. Miller –records of an individual's financial transactions held by his bank were outside the protection of the Fourth Amendment

Basis for narrowing Protection Assumption of the risk –“takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the Government” Voluntary nature of the disclosure – “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties”

"It would be foolish to contend that the degree of privacy secured to citizens by the 4th A has been entirely unaffected by the advance of technology...the question we confront today is what limits there are upon this power of technology to shrink the realm of guaranteed privacy."

Status Quo, Technology, & Law “reasonable expectation of privacy” Dog sniff Aerial photographyThermal imaging expectations capability legal rules

data in networks? The interception of communications, transactional data during transmission. The acquisition of stored communications and transactional data.

ECPA (SCA + amendments to Title III) The Electronic Communications Privacy Act defined two types of ISPs: Electronic Communications Service to the extent you permit users to communicate with each other Remote Computing Service to the extent you permit users to store communications or other information

Kinds of Data Basic Subscriber Information (name, address, equipment identifier such as temporary IP address, and means and source of payment) Other non-content Information (clickstream, location) Wiretap, Pen Register or Trap and Trace Content - Real Time and Stored

Legal Standards Basic Subscriber Information: Subpoena or better (Gov’t may not use civil subpoena) Other Information: 2703(d) order or better Dialed digits: Pen Register or better Real Time Content: Title III order Stored Content < 180 days: search warrant Stored Content > 180 days: subpoena or better Opened v. Unopened -- ct doesn’t matter; doj says once opened no warrant required

1Home Energy Use (Pot diaries) Story of Starkweather “The public awareness that such records are routinely maintained…negate[s] any consistutaionally sufficient expectation of privacy…” Story of Kyllo "We think that obtaining by sense-enhancing technology any information regarding the interior of the home that could not otherwise have been obtained without physical intrusion into a constitutionally protected area constitutes a search -- at least where (as here) the technology in question is not in general public use. This assures preservation of that degree of privacy against government that existed when the 4th A was adopted." Story of Caballes “Well trained narcotics detection dog, one that does not expose noncontraband items that otherwise would remain hidden from public view during a lawful traffic stop generaly does not implicate legitimate privacy interests.”

1Distinctions Is it sensed or recorded? Activity that generates records held by others Activity that is imperceptible without trespass Activity that can be perceived (sensed) from outside, “Plain view” Activity that is rendered perceptible by technology Where is the activity taking place? home v. public street? What is sensed? Just illegal activity, contraband? Mix of legal and illegal activities?

1Lessons A little recording can mean a lot Location matters (people, activity, data) Use of well trained technologies (precise and accurate)– low false positives – outside the 4 th A because they are not searches, at least in some instances Police only technology is unreasonable invasion, readily available technology maybe not

2Cameras in Public Places Value of public places –Community, speech, protest, public life “No Privacy in Public” – –You see me, I see you (reciprocity) –Police need not avert eyes –As much privacy as the space affords –Bounded by space, time, presence

2Ubiquitous image collection I see you, you cannot see me Police virtually present all the time Porous unknowable public “space” Permanence Aggregation Who, when, where of observation change Inability to engage in self help

2Responses Legislated click Bans on camera phones in some places (you may see me but you can’t prove that you saw me) Upskirt laws Barak Obama privacy zone HP anti paparazzi patents

“…how, when, and at what level does privacy matter?” Importance of legal context as well as social context Expectations of privacy are shaped by what is technically possible, technical possibility in turn informs courts’ analysis of reasonableness Court makes distinctions that may not relate to normative understandings -- careful where this happens

Value Driven Architecture Architectural choices constrain policy Policy choices if considered in architectural design can be “hardened” Need to identify policy goals – privacy, security, other – in order to engage in iterative process during design phase Must understand stakeholder needs, technology, law, and have clear objectives

Value Driven Architecture Architectural choices constrain policy Policy choices if considered in architectural design can be “hardened” Need to identify policy goals – privacy, security, other – in order to engage in iterative process during design phase Must understand stakeholder needs, technology, law, and have clear objectives

The last word… Reserved judgment as to how much technological enhancement of ordinary perception, from such a vantage point (public street) if any is too much.