Class 11 Internet Privacy Law Government Surveillance.

Slides:



Advertisements
Similar presentations
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Advertisements

Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Privacy of Communications: Snail Mail to Telephones.
Teaching American History: Moot Courts and Constitutional Concepts.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
The PATRIOT Act, Technology and Records Privacy David L. Sobel General Counsel Electronic Privacy Information Center ECURE 2004 Arizona.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
The 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Suspects Rights Amendments 4, 5 and 6. 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Privacy & Personal Information -- Why do we care or do we?
Class 7 Internet Privacy Law Your Digital Afterlife.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2006.
The Exclusionary Rule The Fourth Amendment History of the Exclusionary Rule Deontological Defenses of the Rule Consequentialist Defenses Objections Alternatives.
Chapter 18 - The Fourth Amendment and National Security.
Our Court System Terms, procedures, and ideas you need to know.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Introduction to Constitutional Law Unit 4. CJ140-02A – Introduction to Constitutional Law Unit 4: The Fourth Amendment CJ140-02A– Class 4 Part 1.
SS4H5 The student will analyze the challenges faced by the new nation.
Chapter 1 What is Law?. Laws and Values Our current legal system is based on values that our government and society believe are most important to keep.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Session Title: FERPA: What You Need To Know Presented By: Jeffery Loggins Institution: Mississippi Valley State University September 15, 2015.
The Bill of Rights The First Fundamental Changes of the Constitution.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Chapter 18 - The Fourth Amendment and National Security.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
The Fourth Amendment and the Home By Laura Zajac.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
The Fourth Amendment, Technology, and a Right to Privacy
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
Chapter 5 (cont’d) 5.4 – Legal Rights and Search Laws.
Due Process Amendments What is due process? Due process, for the people of the United States, refers to how laws are enforced why laws are.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Judicial Branch Basics and “Due Process”. Basic Structure of the Judicial Branch Supreme Court (original and appellate jurisdiction) 13 Circuit Courts.
Chapter 6 Due Process and Other Protected Rights Section 1 The Rights of Criminal Defendants.
Unit 4 Seminar. Tell me what the Miranda warning is and what it means to you.
CONSTITUTION. Preamble We the people of the United States, in order to form a more perfect union, establish justice, insure domestic tranquility, provide.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Surveillance around the world
Courts System Search Warrants.
Limiting the Right of Search
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Lesson # 7 A Practical Guide to Computer Forensics Investigations
4th Amendment (Pre-Internet)
Forensics Week 7.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
The Fourth Amendment and the Home
Employee Privacy and Privacy of Employee Information
Fourth Amendment And Probable Cause.
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
The Surveillance State
The University of Adelaide, School of Computer Science
IA455 Chris Danieli and Zachary gibson
Search & Seizure in Schools:
Presentation transcript:

Class 11 Internet Privacy Law Government Surveillance

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. -Fourth Amendment

Let’s Start Simple…ish

Third-party doctrine ❖ “This Court consistently has held that a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” - Smith v Maryland

Searching your home ❖ Warrant based on: ❖ (1) There is probable cause to believe that the items sought to be seized are connected with criminal activity; and ❖ (2) The items sought to be seized will probably, presently be found in the place sought to be searched.

But what about listening to your conversations?

2 Types of Telephone Monitoring Pen Register Trap and Trace 18 USC 3123 Wiretap 18 USC 2518 Access to incoming and outgoing phone numbers Listen to conversation PrivateVERY PRIVATE Requires administrative subpoenaRequires a warrant + lots more

Listening to your calls ❖ The judge must find: ❖ (1) probable cause for belief that a particular enumerated offense is being committed; and ❖ (2) probable cause for belief that particular communications concerning that offense will be obtained through inter- ception.

s and Electronic Communications

ECPA 18 USC 2703(a) ❖ Contents of Wire or Electronic Communications in Electronic Storage.— A governmental entity may require the disclosure by a provider … of the contents … in an electronic communications system for one hundred and eighty days or less, only pursuant to a warrant ❖ A governmental entity may require the disclosure by a provider … of the contents … electronic storage in an electronic communications system for more than one hundred and eighty days by the means available under subsection (b) of this section.

ECPA 18 USC 2703(b) ❖ Contents of Wire or Electronic Communications in a Remote Computing Service.— ❖ (1) A governmental entity may require [disclosure] made applicable by paragraph (2) of this subsection— ❖ (A) without required notice to the subscriber or customer, if the governmental entity obtains a warrant; or ❖ (B) with prior notice from the governmental entity to the subscriber or customer if the governmental entity— ❖ (i) uses an administrative subpoena…; or ❖ (ii) obtains a court order for such disclosure under subsection (d) of this section; except that delayed notice may be given pursuant to section 2705 of this title. ❖ (2) Paragraph (1) is applicable with respect to any wire or electronic communication that is held or maintained on that service— ❖ (A) on behalf of, and received by means of electronic transmission from (or created by means of computer processing of communications received by means of electronic transmission from), a subscriber or customer of such remote computing service; and ❖ (B) solely for the purpose of providing storage or computer processing services to such subscriber or customer, if the provider is not authorized to access the contents of any such communications for purposes of providing any services other than storage or computer processing.

ECPA 18 USC 2703(c) ❖ Records Concerning Electronic Communication Service or Remote Computing Service.— ❖ (2) A provider of electronic communication service or remote computing service shall disclose to a governmental entity the— ❖ (A) name; ❖ (B) address; ❖ (C) local and long distance telephone connection records, or records of session times and durations; ❖ (D) length of service (including start date) and types of service utilized; ❖ (E) telephone or instrument number or other subscriber number or identity, including any temporarily assigned network address; and ❖ (F) means and source of payment for such service (including any credit card or bank account number), ❖ of a subscriber to or customer of such service when the governmental entity uses an administrative subpoena authorized by a Federal or State statute or a Federal or State grand jury or trial subpoena or any means available under paragraph (1).

Expectation of Privacy?

Cellphone Unlocking ❖ Riley v. California ❖ “[S]uch a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy.” ❖ “The fact that technology now allows an individual to carry such information in his hand,” the chief justice also wrote, “does not make the information any less worthy of the protection for which the founders fought.”

FBI Calls for Cellphone Unlocking ❖ “I am a huge believer in the rule of law, but I am also a believer that no one in this country is beyond the law. What concerns me about this is companies marketing something expressly to allow people to place themselves above the law.” - FBI Director Comey

Statement of FBI Director I like and believe very much that we should have to obtain a warrant from an independent judge to be able to take the content of anyone's closet or their smart phone. The notion that someone would market a closet that could never be opened - - even if it involves a case involving a child kidnapper and a court order -- to me does not make any sense. Google is marketing their Android the same way: Buy our phone and law- enforcement, even with legal process, can never get access to it. There will come a day -- well it comes every day in this business -- when it will matter a great, great deal to the lives of people of all kinds that we be able to with judicial authorization gain access to a kidnapper's or a terrorist or a criminal's device. I just want to make sure we have a good conversation in this country before that day comes. I'd hate to have people look at me and say, 'Well how come you can't save this kid,' 'how come you can't do this thing.'

LEADS (Law Enforcement Access to Data Stored Abroad Act)

What Microsoft Does What Others Do

Microsoft v USA ( ) ❖ Last December, U.S. Magistrate Judge James C. Francis IV issued a search warrant that authorized the government to obtain information associated with an account that was hosted in Dublin. ❖ Fully briefed and will be argued in front of the 2nd Circuit in the fall.

LEADS (Law Enforcement Access to Data Stored Abroad Act) S. 512 (Sen. Hatch), H.R (Rep. Marino) ❖ Clarify the warrant requirement for digital communication ❖ Provides extraterritorial jurisdiction for warrants regarding U.S. persons ❖ Strengthens the framework for the Mutual Legal Assistance Treaty (MLAT) process ❖ Sense of Congress against data localization